You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps
نویسندگان
چکیده
IME (input method editor) apps are the primary means of interaction on mobile touch screen devices and thus are usually granted with access to a wealth of private user input. In order to understand the (in)security of mobile IME apps, this paper first performs a systematic study and uncovers that many IME apps may (intentionally or unintentionally) leak users’ sensitive data to the outside world (mainly due to the incentives of improving the user’s experience). To thwart the threat of sensitive information leakage while retaining the benefits of an improved user experience, this paper then proposes I-BOX, an app-transparent oblivious sandbox that minimizes sensitive input leakage by confining untrusted IME apps to predefined security policies. Several key challenges have to be addressed due to the proprietary and closed-source nature of most IME apps and the fact that an IME app can arbitrarily store and transform user input before sending it out. By designing system-level transactional execution, I-BOX works seamlessly and transparently with IME apps. Specifically, I-BOX first checkpoints an IME app’s state before the first keystroke of an input, monitors and analyzes the user’s input, and rolls back the state to the checkpoint if it detects the potential danger that sensitive input may be leaked. A proof of concept I-BOX prototype has been built for Android and tested with a set of popular IME apps. Experimental results show that I-BOX is able to thwart the leakage of sensitive input for untrusted IME apps, while incurring very small runtime overhead and little impact on user experience.
منابع مشابه
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android
An Android app can collaborate with other apps by using an intent. It can also control personal information or use permissions granted by a user. However, users cannot detect when their apps communicates with other apps. Therefore, they might not be aware of any information leakage if an app happens to be malware. In this paper, we propose a method for tracking and visualizing the diffusion of ...
متن کاملEvaluating ELT Materials: A Comparison between Traditional Materials and Mobile Apps
This study attempted to evaluate and compare language learning apps and the related traditional books on the same subject. The apps included Murphy’s English Grammar and Cambridge Discovery Readers and the traditional materials were English Grammar in Use and Developing Reading Skills. The study, thus, aimed to do a comparative analysis between traditional ELT materials and the digital versions...
متن کاملFactors Influencing Professional Nurses’ Acceptance and Use of Mobile Medical Apps in Ghana
The use of mobile medical apps in clinical settings has recently received considerable attention. While some practitioners are using this technology to optimize decision making, others, on the other hand, are indifferent about its usage. Therefore, this study has utilized a modified UTAUT2 model to determine factors that influence the acceptance and use of mobile medical apps among professional...
متن کاملThe Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads
In-app advertising is an essential part of the ecosystem of free mobile applications. On the surface, this creates a win-win situation where app developers can profit from their work without charging the users. However, as in the case of web advertising, ad-networks behind in-app advertising employ personalization to improve the effectiveness/profitability of their ad-placement. This need for s...
متن کاملPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information
The market for mobile apps is expanding quickly. Customer adoption for these apps is determined positively by app utility and social information as well as negatively by the perceived privacy risk associated with disclosing sensitive private information such as customer identity and geographical location. Because of the social nature of many of these apps, and the characteristics of the primary...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015