GUILeak: Identifying Privacy Practices on GUI-Based Data

نویسندگان

  • Xiaoyin Wang
  • Xue Qin
  • Mitra Bokaei Hosseini
  • Rocky Slavin
  • Travis D. Breaux
  • Jianwei Niu
چکیده

As the most popular mobile platform, Android devices have millions of users around the world. As these devices are used everyday and collects various data from users, effective privacy protection has been a well known challenge in the Android world. Existing privacy-protection approaches focus on information accessed from Android API methods, such as location and device ID, while existing security-enhancement approaches are not fine-grained enough to map user input data to concepts in privacy policies. In this paper, we proposed a novel approach that automatically detects privacy leakage on user input data for a given Android app, and determines whether such leakage may violate privacy policies coming with the Android app. For evaluation, we applied our approach to 80 popular apps from two important app categories: finance and health. The results show that our approach is able to detect 20 strong violations, and 10 weak violations from the studied apps.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications

The Android mobile platform supports millions of users and their mobile devices across more than 190 countries around the world. This popularity coupled with user data collection by Android apps has made privacy protection a well-known challenge in the Android ecosystem. In practice, app producers provide privacy policies disclosing what information is collected and processed by the app. Howeve...

متن کامل

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online

Online privacy notices are supposed to act as the primary mechanism to inform users about the data practices of online services. In practice, users ignore notices as they are too long and complex to read. Instead, users rely on formed expectations to determine with which site they feel comfortable interacting. Mismatches between actual practices and a user’s expectations may result in users exp...

متن کامل

Societal impacts of big data: challenges and opportunities in Europe

This paper presents the risks and opportunities of big data and the potential social benefits it can bring. The research is based on an analysis of the societal impacts observed in a set of six case studies across different European sectors. These impacts are divided into economic, social and ethical, legal and political impacts, and affect areas such as improved efficiency, innovation and deci...

متن کامل

بررسی عملکرد حفظ حریم شخصی بیماران در دانشجویان کارآموز و کارورز دانشکده‌ی پرستاری و مامایی دانشگاه علوم پزشکی بوشهر سال ۱۳۹۵

Maintaining the privacy is one of the most fundamental rights of the patients, based on the need for respect to human dignity. Considering that today's students are tomorrow's nurses who are directly involved with patients during and after their education, it is necessary to review their performance regarding the privacy of patients. Therefore, the present study aimed to investigate the privacy...

متن کامل

Research on Privacy Preserving on K-anonymity

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017