skip to main content
10.1145/2448556.2448610acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A proposal for the privacy leakage verification tool for Android application developers

Published:17 January 2013Publication History

ABSTRACT

Nowadays, smartphone market has been growing rapidly, and smartphone has become essential as a business tool. One of the crucial advantages of a smartphone is an installable third-party application. Number of these has continued to grow explosively.

However, vulnerabilities in smartphone applications are seemed as serious problem. This is not only for the smartphone users, also for smartphone application developers and/or vendors.

Until now, most vulnerability tests on smartphone applications are targeted that has been packaged as a commercial product and distributed in application marketplaces. These tests are performed on dynamically on application binaries.

In this paper, we aim to develop the static vulnerability verification tool that can be utilized for smartphone application developers and/or vendors in the implementation and/or test phase of development process.

This tool intakes source codes and determine where to read the privacy information in the source codes, and determine where to write/send the information in there.

Then analyze the privacy information transfer and/or transform flow and report the possibilities of privacy information leakage to application developers.

References

  1. Aho, A. V., Sethi, R. and Ullman, J. D., Compilers: Principles, Techniques, and Tools, Prentice Hall, New Jersey, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Appel, A. W. and Palsberg, J., Modern Compiler Implementation in Java, Cambridge University Press, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Asher, A., Skype-Skype Security blog- {Fixed} Privacy vulnerability in Skype for Android, 2011, http://blogs.skype.com/security/2011/04/privacy_vulnerability_in_skype.htmlGoogle ScholarGoogle Scholar
  4. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A. and Shastry, B., Towards Taming Privilege-Escalation Attacks on Android, in 19th Annual Network & Distributed System Security Symposium, (San Diego, CA, USA, 2012).Google ScholarGoogle Scholar
  5. Chaudhuri, A., Language-Based Security on Android, in ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, (Dublin, Ireland, 2009). 1--7. DOI=http://dx.doi.org/10.1145/1554339.1554341 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Enck, W., Ongtang, M. and McDaniel, P., Understanding Android Security, IEEE Security and Privacy, Volume 7(1). 50--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Enck, W., Gilbert, P., Chun, B, Cox, L. P., Jung, J., McDaniel, P. and Sheth, A. N., TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, in Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, (Vancouver, BC, Canada, 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Felt, A., Chin, E., Hanna, S., Song, D. and Wagner, D., Android permissions demystified, in 18th ACM Conference on Computer and Communications Security (Chicago, IL, USA, 2011). 627--638. DOI=http://dx.doi.org/10.1145/2046707.2046779 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gosling, J., Joy, B., Steele, G. and Bracha, G., The Java Language Specification (Third Edition). Addison-Wesley, Boston, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hiroshi L., Android and Security, 2012, http://googlemobile.blogspot.jp/2012/02/android-and-security.htmlGoogle ScholarGoogle Scholar
  11. Hornyack, P., Han, S., Jung, J., Schechtery, S. and Wetherall, D., These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, in 18th ACM Conference on Computer and Communications Security, (Chicago, IL, USA, 2011). 639--652. DOI=http://dx.doi.org/10.1145/2046707.2046780 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jing, Y., Ahn, G. and Hu, H., Model-Based Conformance Testing for Android, in Advances in Information and Computer Security, 7th International Workshop on Security, IWSEC (Fukuoka, JAPAN, 2012). Springer, 1--18.Google ScholarGoogle Scholar
  13. Marforio, C., Aurélien, F. and Capkun, S. 2011. Application collusion attack on the permission-based security model and its implications for modern smartphone systems, Technical Report. Eidgenössische Technische Hochschule Zürich. DOI=http://dx.doi.org/10.3929/ethz-a-006720730Google ScholarGoogle Scholar
  14. Oberheide, J., Dissecting, Android's Bouncer, 2012, https://blog.duosecurity.com/2012/06/dissecting-androids-bouncer/Google ScholarGoogle Scholar
  15. Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A. and Wang, X. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in 18th Annual Network and Distributed System Security Symposium, (San Diego, CA, USA, 2011).Google ScholarGoogle Scholar
  16. Android SDK --- Android Developers, http://developer.android.com/sdk/index.htmlGoogle ScholarGoogle Scholar
  17. Android Security Overview, http://source.android.com/tech/security/index.htmlGoogle ScholarGoogle Scholar
  18. Eclipse Java development tools(JDT), 2012, http://www.eclipse.org/jdt/Google ScholarGoogle Scholar
  19. Google Play, https://play.google.com/storeGoogle ScholarGoogle Scholar
  20. Manifest.permission --- Android Developers, 2012, http://developer.android.com/reference/android/Manifest.permission.htmlGoogle ScholarGoogle Scholar
  21. Package Index --- Android Developers, 2012, http://developer.android.com/reference/packages.htmlGoogle ScholarGoogle Scholar
  22. (permission) Android developers, 2012, http://developer.android.com/guide/topics/manifest/permission-element.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. A proposal for the privacy leakage verification tool for Android application developers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
          January 2013
          772 pages
          ISBN:9781450319584
          DOI:10.1145/2448556

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 January 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate251of941submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader