Android Apps: What are they doing with your precious Internet?

نویسندگان

  • Amy Tang
  • Ashwin Rao
  • Justine Sherry
  • David R. Choffnes
چکیده

Increasing numbers of people use mobile devices to transmit personal information. Privacy consequently becomes an important issue. With the current Android permissions system, users may grant broad Internet access to an application, but are unable to see how exactly that access is used. We define a “well-behaved” application as one that: 1. only uses necessary resources, 2. contacts only necessary parties, 3. keeps personally identifiable information (PII) confidential. We installed the application Meddle [1] to track mobile traffic. The client sends traffic through aVPN through the Meddle server. Meddle then logs the packets for later analysis. A preliminarystudy following three users over 50 days showed that only 56% of users’ traffic used HTTPS, while40% is unencrypted HTTP. Additionally, we discovered that one user with 20 apps contactedmore than 100 different organizations. As a result, there are hundreds of points of access where anattacker could find unencrypted information.Doing an app-by-app analysis on 20 applications, we also discovered deviant, but not outright ma-licious behavior from certain applications. The WeatherBug app leaked unencrypted geolocationcoordinates, allowing an eavesdropper to pinpoint the user’s current location. Pinterest contactedan excessive number of CDNs (7), exposing data to an unnecessary number of parties. Generally,the applications considered in the study do not abuse their privileges, but may still affect users neg-atively. Indeed, of the applications considered in our study, only 35% were well-behaved accordingto our criteria defined above, indicating there is scope for further improvement. BODYThe majority of Android apps are not malicious, but use internet access inways that are not compatible with the user’s interests.REFERENCES[1] Meddle. http://meddle.cs.washington.edu. Volume 2 of Tiny Transactions on Computer ScienceThis content is released under the Creative Commons Attribution-NonCommercial ShareAlike License. Permission tomake digital or hard copies of all or part of this work is granted without fee provided that copies are not made ordistributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.CC BY-NC-SA 3.0: http://creativecommons.org/licenses/by-nc-sa/3.0/.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Android Permission Model

The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the a...

متن کامل

Building Android Apps with HTML, CSS, and JavaScript - Making Native Apps with Standards-Based Web Tools

Change your habit to hang or waste the time to only chat with your friends. It is done by your everyday, don't you feel bored? Now, we will show you the new habit that, actually it's a very old habit to do that can make your life more qualified. When feeling bored of always chatting with your friends all free time, you can find the book enPDF building android apps with html css and javascript m...

متن کامل

Screenmilker: How to Milk Your Android Screen for Secrets

With the rapid increase in Android device popularity, the capabilities that the diverse user base demands from Android have significantly exceeded its original design. As a result, people have to seek ways to obtain the permissions not directly offered to ordinary users. A typical way to do that is using the Android Debug Bridge (ADB), a developer tool that has been granted permissions to use c...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

App Inventor - Create Your Own Android Apps

Give us 5 minutes and we will show you the best book to read today. This is it, the app inventor create your own android apps that will be your best choice for better reading book. Your five times will not spend wasted by reading this website. You can take the book as a source to make better concept. Referring the books that can be situated with your needs is sometime difficult. But here, this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • TinyToCS

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2013