DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android
نویسندگان
چکیده
An Android app can collaborate with other apps by using an intent. It can also control personal information or use permissions granted by a user. However, users cannot detect when their apps communicates with other apps. Therefore, they might not be aware of any information leakage if an app happens to be malware. In this paper, we propose a method for tracking and visualizing the diffusion of sensitive information and preventing its leakage on an Android device. This method, which we call DroidTrack, alerts a user that there is the possibility of information leakage when an app uses APIs (Application Program Interfaces) to communicate externally. These alerts are triggered only if the app has already called APIs to collect sensitive information. Users are given the option to refuse the execution of the API if it is not appropriate. Furthermore, by illustrating how their personal data is shared, users are provided with the necessary information to help them decide whether an API call is appropriate.
منابع مشابه
DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android
An app in Android can collaborate with other apps and control personal information by using the Intent or user's allowing of permission. However, users cannot detect when they communicate. Therefore, users might not be aware information leakage if app is malware. This paper proposes DroidTrack, a method for tracking the diffusion of personal information and preventing its leakage on an Android ...
متن کاملTest and Evaluation of Patient Tracking Platform: Use of Near Field Communication
In an earthquake situation, medical response communities such as field and referral hospitals are being challenged with injured victims’ identification and tracking. In our project, we developed a patient tracking platform (PTP). In this platform, first responders triage the patients with an electronic tag that reports the location and some information of each patient during his or her movement...
متن کاملPrivacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis
A static analysis is presented, based on the theory of abstract interpretation, for verifying privacy policy compliance by mobile applications. This includes instances where, for example, the application releases the user’s location or device ID without authorization. It properly extends previous work on datacentric semantics for verification of privacy policy compliance by mobile applications ...
متن کامل"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking
Over the last 12 years three important dates have marked the beginning of a major paradigm shift in computing and the security models applied to protect an emerging computing environment March 1999, January 9th, 2007, and July 2007. These dates roughly correspond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date, Steve Jobs introduction of the Ipho...
متن کاملInvestigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection
Today’s Smartphone operating systems frequently fail to provide users with adequate control and visibility into how the third-party applications use their private data. With TaintDroid realized on Android system, we can detect user’s implicit taint and privacy leakage. But TaintDroid has some inherent defects. To better detect user’s implicit taint and privacy leakage in the Android platform, t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 4 شماره
صفحات -
تاریخ انتشار 2014