MonkeyDroid: Detecting unreasonable privacy leakages of android applications

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Static and dynamic taint-analysis approaches have been developed to detect the processing of sensitive information. Unfortunately, faced with the result of analysis about operations of sensitive information, people have no idea of which operation is legitimate operation and which is stealthy malicious behavior. In this paper, we present Monkeydroid to pinpoint automatically whether the android application would leak sensitive information of users by distinguishing the reasonable and unreasonable operation of sensitive information on the basis of information provided by developer and market provider. We evaluated Monkeydroid over the top 500 apps on the Google play and experiments show that our tool can effectively distinguish malicious operations of sensitive information from legitimate ones.

Cite

CITATION STYLE

APA

Ma, K., Liu, M., Guo, S., & Ban, T. (2015). MonkeyDroid: Detecting unreasonable privacy leakages of android applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9491, pp. 384–391). Springer Verlag. https://doi.org/10.1007/978-3-319-26555-1_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free