Skip to main content

2015 | OriginalPaper | Buchkapitel

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System

verfasst von : Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, Robert Ludwiniak, Gordon Russell

Erschienen in: Human Aspects of Information Security, Privacy, and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ’normal’ apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, J.: Realtime monitoring of private data abuses in android system. M.Sc. Thesis, University of Bristol, September 2014 Chen, J.: Realtime monitoring of private data abuses in android system. M.Sc. Thesis, University of Bristol, September 2014
3.
Zurück zum Zitat Zhou, Y., Singh, K., Jiang, X.: Owner-centric protection of unstructured data on smartphones. In: Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST 2014), Crete, Greece, June 2014 Zhou, Y., Singh, K., Jiang, X.: Owner-centric protection of unstructured data on smartphones. In: Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST 2014), Crete, Greece, June 2014
4.
Zurück zum Zitat Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DIVILAR: diversifying intermediate language for anti-repackaging on android platform. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), San Antonio, TX, March 2014 Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DIVILAR: diversifying intermediate language for anti-repackaging on android platform. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), San Antonio, TX, March 2014
6.
Zurück zum Zitat Tang, W., Jin, G., He, J., Jiang, X.: Extending android security enforcement with a security distance model. In: IEEE 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4 (2011) Tang, W., Jin, G., He, J., Jiang, X.: Extending android security enforcement with a security distance model. In: IEEE 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1–4 (2011)
10.
Zurück zum Zitat Gates, C.S., Chen, J., Li, N., Proctor, R.W.: Effective risk communication for android apps. IEEE Trans. Dependable Secur. Comput. 11(3), 252–265 (2014)CrossRef Gates, C.S., Chen, J., Li, N., Proctor, R.W.: Effective risk communication for android apps. IEEE Trans. Dependable Secur. Comput. 11(3), 252–265 (2014)CrossRef
13.
Zurück zum Zitat Jiang, D., Fu, X., Song, M., Cui, Y: A security assessment method for android applications based on permission model. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 2, pp. 701–705 (2012) Jiang, D., Fu, X., Song, M., Cui, Y: A security assessment method for android applications based on permission model. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 2, pp. 701–705 (2012)
14.
Zurück zum Zitat Kuzuno, H., Tonami, S.: Signature generation for sensitive information leakage in android applications. In: 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp. 112–119 (2013) Kuzuno, H., Tonami, S.: Signature generation for sensitive information leakage in android applications. In: 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp. 112–119 (2013)
15.
Zurück zum Zitat Wei, T.E., Jeng, A.B., Lee, H.M., Chen, C.H., Tien, C.W.: Android privacy. In: 2012 IEEE International Conference onIn Machine Learning and Cybernetics (ICMLC), vol. 5, pp. 1830–1837 (2012) Wei, T.E., Jeng, A.B., Lee, H.M., Chen, C.H., Tien, C.W.: Android privacy. In: 2012 IEEE International Conference onIn Machine Learning and Cybernetics (ICMLC), vol. 5, pp. 1830–1837 (2012)
16.
Zurück zum Zitat Wu, L., Du, X., Fu, X.: Security threats to mobile multimedia applications: camera-based attacks on mobile phones. IEEE Commun. Mag. 52(3), 80–87 (2014)CrossRef Wu, L., Du, X., Fu, X.: Security threats to mobile multimedia applications: camera-based attacks on mobile phones. IEEE Commun. Mag. 52(3), 80–87 (2014)CrossRef
Metadaten
Titel
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
verfasst von
Shancang Li
Junhua Chen
Theodoros Spyridopoulos
Panagiotis Andriotis
Robert Ludwiniak
Gordon Russell
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20376-8_34

Premium Partner