skip to main content
10.1145/2565585.2565593acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Information leakage through mobile analytics services

Authors Info & Claims
Published:26 February 2014Publication History

ABSTRACT

In this paper we investigate the risk of privacy leakage through mobile analytics services and demonstrate the ease with which an external adversary can extract individual's profile and mobile applications usage information, through two major mobile analytics services, i.e. Google Mobile App Analytics and Flurry. We also demonstrate that it is possible to exploit the vulnerability of analytics services, to influence the ads served to users' devices, by manipulating the profiles constructed by these services. Both attacks can be performed without the necessity of having an attacker controlled app on user's mobile device. Finally, we discuss potential countermeasures (from the perspectives of different parties) that may be utilized to mitigate the risk of individual's personal information leakage.

References

  1. Pdroid -- the better privacy protection, December 2011. http://www.xda-developers.com/android/pdroid-the-better-privacy-protection/.Google ScholarGoogle Scholar
  2. Android "kitkat" update -- new privacy features, November 2013. http://www.futureofprivacy.org/2013/11/15/android-kitkat-update-new-privacy-features/.Google ScholarGoogle Scholar
  3. Using identifiers in your apps, March 2013. https://developer.apple.com/news/?id=3212013a.Google ScholarGoogle Scholar
  4. A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mockdroid: trading privacy for application functionality on smartphones. In HotMobile, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Chen, A. Chaabane, P.-U. Tournoux, M. A. Kaafar, and R. Boreli. How Much is too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. In PETS'13, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  6. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. of 9th USENIX Symposium on OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android Application Security. In Proceedings of the 20th USENIX conference on Security, SEC'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proc. of 20th USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe Exposure Analysis of Mobile In-app Advertisements. In WISEC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Han. A Study of Third-Party. Tracking by Mobile Apps in the Wild. Technical report, University of Washington UW-CSE-12-03-01, 2012.Google ScholarGoogle Scholar
  11. I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo. Don't kill my ads!: balancing privacy in an ad-supported mobile application market. In HotMobile, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information leakage through mobile analytics services

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          HotMobile '14: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
          February 2014
          134 pages
          ISBN:9781450327428
          DOI:10.1145/2565585

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 February 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          HotMobile '14 Paper Acceptance Rate22of72submissions,31%Overall Acceptance Rate96of345submissions,28%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader