DAPA: Degradation-aware privacy analysis of Android apps

10Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When installing or executing an app on a smartphone, we grant it access to part of our (possibly confidential) data stored in the device. Traditional information-flow analyses aim to detect whether such information is leaked by the app to the external (untrusted) environment. The static analyser we present in this paper goes one step further. Its aim is to trace not only if information is possibly leaked (as this is almost always the case), but also how relevant such a leakage might become, as an under-and over-approximation of the actual degree of values degradation. The analysis captures both explicit dependences and implicit dependences, in an integrated approach. The analyser is built within the Abstract Interpretation framework on top of our previous work on datacentric semantics for verification of privacy policy compliance by mobile applications. Results of the experimental analysis on significant samples of the DroidBench library are also discussed.

Cite

CITATION STYLE

APA

Barbon, G., Cortesi, A., Ferrara, P., & Steffinlongo, E. (2016). DAPA: Degradation-aware privacy analysis of Android apps. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9871 LNCS, pp. 32–46). Springer Verlag. https://doi.org/10.1007/978-3-319-46598-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free