A usage-pattern perspective for privacy ranking of android apps

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android applies a permission-based model to regulate applications (apps). When users grant apps permissions to access their sensitive data, they cannot control how the apps utilize the data. Existing taint-based techniques only detect the presence of exfiltration flow for the sensitive data, but cannot detect how much sensitive data are leaked. Users need more intuitive measures to inform them which apps are going to leak more of their private information. In this paper, we take an alternative approach for identifying apps’ internal logic about how they utilize the sensitive data.We define such logic as a sequence of operations on the sensitive data, named as the data usage pattern.We build a static analysis tool to automatically extract data usage patterns from Android apps. Our evaluation shows that our approach effectively and efficiently identifies the key operations and thus ranks Android apps according to different usage patterns.

Cite

CITATION STYLE

APA

Li, X., Dong, X., & Liang, Z. (2014). A usage-pattern perspective for privacy ranking of android apps. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8880, pp. 245–256). Springer Verlag. https://doi.org/10.1007/978-3-319-13841-1_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free