A Grey List-Based Privacy Protection for Android

نویسندگان

  • Dapeng Wang
  • Guang Jin
  • Jiaming He
  • Xianliang Jiang
  • Zhijun Xie
چکیده

The openness of Android OS and the easy development of applications have attracted a large number of enthusiasts to join in. Due to the deficiencies of permission mechanism of Android OS, an Android privacy protection system called Protectedroid is presented in this paper which is a model based on grey list and enables the design of security strategies more easily. Protectedroid adds an enforcing privacy protection module between App and private data. When an application is added to the grey list and intends to access sensitive data and resources, Protectedroid will intercept data access request and return false objects for the grey applications. Experimental results show that: Protectedroid can effectively throttle the privacy leakage and ensure the effectiveness and stability of the entire system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Does the Android Permission System Provide Adequate Information Privacy Protection for End-users of Mobile Apps?

This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...

متن کامل

Mobile Root Exploit Detection based on System Events Extracted from Android Platform

Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note I/II and Galaxy Tab 10.1, etc. The malicious application can be distributed and installed on user’s mobile devices through open market after masquerading as a common normal application. An attacker inserts malicious code into an application...

متن کامل

GUILeak: Identifying Privacy Practices on GUI-Based Data

As the most popular mobile platform, Android devices have millions of users around the world. As these devices are used everyday and collects various data from users, effective privacy protection has been a well known challenge in the Android world. Existing privacy-protection approaches focus on information accessed from Android API methods, such as location and device ID, while existing secur...

متن کامل

Two-factor Protection Scheme in Securing the Source Code of Android Applications

While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the pro...

متن کامل

Context-Aware Usage Control for Android

The security of smart phones is increasingly important due to their rapid popularity. Mobile computing on smart phones introduces many new characteristics such as personalization, mobility, pay-for-service and limited resources. These features require additional privacy protection and resource usage constraints in addition to the security and privacy concerns on traditional computers. As one of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014