EDSDroid: A hybrid approach for information leak detection in android

3Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Leaking personal information on mobile devices is a serious problem. Work on information leak detection for mobile devices, until now, mostly focus on action within a single application, while the coordinated action of several applications for the malicious purpose is becoming popular. This study proposes a hybrid approach that combines static and dynamic analysis to detect information leak as a result of the coordinated action of multiple applications. In this text, we call it interapplication malware. The analysis takes place in two stages. In the first stage, we use static analysis to determine the chains of sensitive actions on multiple applications. The chain of sensitive actions is the sequential user’s actions that may lead to information leakage. In the second stage, we validate whether the chain of sensitive actions indeed leaks user’s data by using the dynamic analysis. In fact, the applications in question are forced to execute after the chains of sensitive actions detected in the first stage. We monitor the sensitive actions to determine which actions make information leak. In order to do so, we modify the Android Emulator to trigger and monitor any action of any applications running on it. We have evaluated our tool, namely eDSDroid, on the famous Toyapps test case. The test result shows the correctness and effectiveness of our tool.

Cite

CITATION STYLE

APA

Ly, H. T., Nguyen, T. C., & Pham, V. H. (2017). EDSDroid: A hybrid approach for information leak detection in android. In Lecture Notes in Electrical Engineering (Vol. 424, pp. 290–297). Springer Verlag. https://doi.org/10.1007/978-981-10-4154-9_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free