Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework

نویسندگان

  • Naoya Kajiwara
  • Shinichi Matsumoto
  • Yuuki Nishimoto
  • Yoshiaki Hori
  • Kouichi Sakurai
چکیده

In recent years, Android based smartphones have become popular. As a feature of a smart phone, much information for identifying a user and information linked to user’s privacy is saved in a terminal. For this feature, many malwares targeting privacy information are developed. Many security mechanisms are provided in Android for such malwares. However, it is difficult for users to judge the availability of application by understanding the potential threats in the application. In this paper, we focus on acquisition of information by using a remote procedure call when we invoke the API to acquire phone ID. We design a methodology to record invocation of the API by inserting Log.v methods. Proposal method is implemented within Android framework layer. For this reason, malicious application developers cannot circumvent log output by their malwares. We examined our method, and confirmed empirically the record of the invocation behavior of the API to acquire phone ID.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward a Framework for Detecting Privacy Policy Violation in Android Application Code

Mobile applications frequently access sensitive personal information to meet user or business requirements. Because this information is sensitive, regulators increasingly require mobile app developers to publish privacy policies that describe what information is collected, for what purpose is the information used and with whom it is shared. Furthermore, regulators have fined companies when thes...

متن کامل

Android Malware Detection Using Library API Call Tracing and Semantic-Preserving Signal Processing Techniques

We propose to develop a new malware detection mechanism for Android-based mobile devices based upon library API call tracing and signal processing techniques. By tracing and utilizing library API calls we can capture the intentions/behaviors of an application at a higher level. Also, signal processing techniques, such as a wavelet-based transformation, may have the advantage of enhanced flexibi...

متن کامل

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework

A wealth of recent research proposes static data flow analysis for the security analysis of Android applications. One of the building blocks that these analysis systems rely upon is the computation of a precise control flow graph. The callback mechanism provided and orchestrated by the Android framework makes the correct generation of the control flow graph a challenging endeavor. From the anal...

متن کامل

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework

The Android framework utilizes a permission-based security model, which is essentially a variation of the ACL-based access control mechanism. This security model provides controlled access to various system resources. Access control systems are known to be vulnerable to anomalies in security policies, such as inconsistency. In this work, we focus on inconsistent security enforcement within the ...

متن کامل

Summarizing Control Flow of Callbacks for Android API Methods

Ensuring the reliability and security of Android apps is important considering the large Android market and the critical usage of Android apps. To analyze and test Android apps, we need to know program paths, i.e., the control flow of callbacks implemented in the apps. One of the challenges to identify such information is the extensive use of the Android API methods in the apps. These methods c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014