Prevention of cross-update privacy leaks on android

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Updating applications is an important mechanism to enhance their availability, functionality, and security. However, without careful considerations, application updates can bring other security problems. In this paper, we consider a novel attack that exploits application updates on Android: a cross-update privacy-leak attack called COUPLE. The COUPLE attack allows an application to secretly leak sensitive data through the cross-update interaction between its old and new versions; each version only has permissions and logic for either data collection or transmission to evade detection. We implement a runtime security system, BREAKUP, that prevents cross-update sensitive data transactions by tracking permission-use histories of individual applications. Evaluation results show that BREAKUP’s time overhead is below 5%. We further show the feasibility of the COUPLE attack by analyzing the versions of 2,009 applications (28,682 APKs).

Cite

CITATION STYLE

APA

Cho, B., Lee, S., Xu, M., Ji, S., Kim, T., & Kim, J. (2018). Prevention of cross-update privacy leaks on android. Computer Science and Information Systems, 15(1), 111–137. https://doi.org/10.2298/CSIS170728047C

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free