ABSTRACT
With the improvement of the status of mobile phones and other mobile terminals in life, the privacy protection of mobile phones is still a big problem. Aiming at the Android system, the mobile terminal operating system with the largest share today, this paper proposes a widget intention analysis method to solve the problem of how to judge the user's operation intention in privacy protection. This intention analysis method uses MobilenetV3 to extract image information, BiLSTM to extract text information, then constructs joint features together, and uses deep learning technology to realize intention analysis of widgets. Through comparative experiments, our method improves the detection accuracy and reduces the training time for the existing methods.
- Android vs. iOS Smartphone OS sales market share evolution from https://www.kantarworldpanel.com/global/smartphone-os-market-share/Google Scholar
- China Mobile Security Report in 2019 from https://zt.360.cn/1101061855.php?dtid=1101061451&did=610435085Google Scholar
- X Chen, S. Zhu, "DroidJust: automated functionality-aware privacy leakage analysis for Android applications[C]", Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks., pp. 5, 2015.Google ScholarDigital Library
- Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, X. S. Wang, "Appintent: Analyzing sensitive data transmission in android for privacy leakage detection", Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security CCS’ 13, pp. 1043-1054, 2013.Google ScholarDigital Library
- X. Xiao, X. Wang, Z. Cao, H. Wang and P. Gao, "IconIntent: Automatic Identification of Sensitive UI Widgets Based on Icon Classification for Android Apps," 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), Montreal, QC, Canada, 2019, pp. 257-268.Google Scholar
- Xi S, Yang S, Xiao X, DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019: 2421-2436.Google Scholar
- Howard, Andrew, “Searching for MobileNetV3.” 2019 IEEE/CVF International Conference on Computer Vision (ICCV), 2019, pp. 1314–1324.Google ScholarCross Ref
- A. Aziz Sharfuddin, M. Nafis Tihami and M. Saiful Islam, "A Deep Recurrent Neural Network with BiLSTM model for Sentiment Classification," 2018 International Conference on Bangla Speech and Language Processing (ICBSLP), Sylhet, 2018, pp. 1-4, doi: 10.1109/ICBSLP.2018.8554396.Google Scholar
- B. Andow, A. Acharya, D. Li, W. Enck, K. Singh, T. Xie, "UIRef: Analysis of sensitive user inputs in android applications", ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017.Google Scholar
- Y. Nan , "Identifying User-Input Privacy in Mobile Applications at a Large Scale" in IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 647-661, March 2017.Google ScholarDigital Library
- J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, G. Jiang, "SUPOR: precise and scalable sensitive user input detection for android apps", USENIX Security Symposium, 2015.Google Scholar
- Huang, Gao, “Densely Connected Convolutional Networks.” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 2261–2269.Google ScholarCross Ref
- Cho, Kyunghyun, “Learning Phrase Representations Using RNN Encoder–Decoder for Statistical Machine Translation.” Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 2014, pp. 1724–1734.Google ScholarCross Ref
- Jiasen Lu, Jianwei Yang, Dhruv Batra, and Devi Parikh. 2016. Hierarchical question-image co-attention for visual question answering. In Advances In NeuralGoogle Scholar
- M. Lee, J. Lee, J. Kim, B. Kim and J. Kim, "The Sparsity and Activation Analysis of Compressed CNN Networks in a HW CNN Accelerator Model," 2019 International SoC Design Conference (ISOCC), Jeju, Korea (South), 2019, pp. 255-256, doi: 10.1109/ISOCC47750.2019.9027643.Google Scholar
- Howard, Andrew G., “MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications.” ArXiv Preprint ArXiv:1704.04861, 2017.Google Scholar
- Sandler M , Howard A , Zhu M , MobileNetV2: Inverted Residuals and Linear Bottlenecks[C]// 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2018.Google Scholar
- M. Tan, B. Chen, R. Pang, V. Vasudevan, and Q. V. Le. Mnasnet: Platform-aware neural architecture search for mobile. CoRR, abs/1807.11626, 2018.Google Scholar
- T. Yang, A. G. Howard, B. Chen, X. Zhang, A. Go, M. Sandler, V. Sze, and H. Adam. Netadapt: Platform-aware neural network adaptation for mobile applications. In ECCV, 2018Google ScholarDigital Library
- Hochreiter S , Schmidhuber J . Long Short-Term Memory[J]. Neural Computation, 1997, 9(8):1735-1780.Google ScholarDigital Library
- Li Yang, Yuxi Wu, Junli Wang and Yili Liu. Research on recurrent neural network[J]. Journal of Computer Applications,2018,38(S2):1-6+26.Google Scholar
- Hao Shu, Chen Wang and Yin Shi. Intrusion detetction based on BiLSTM and attention mechanism[J]. Computer Engineering And Design, 2020,41(11):3042-3046.Google Scholar
Recommendations
Android: Changing the Mobile Landscape
The mobile phone landscape changed last year with the introduction of smart phones running Android, a platform marketed by Google. Android phones are the first credible threat to the iPhone market. Not only did Google target the same consumers as iPhone,...
Android platform-based individual privacy information protection system
With the popularity of mobile phones with Android platform, Android platform-based individual privacy information protection has been paid more attention to. In consideration of individual privacy information problem after mobile phones are lost, this ...
Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception
A smart mobile device SMD for short has become indispensable for individuals nowadays. The most common SMD-OS operating system used such as Google's Android, Apple's iOS, Microsoft's Windows Phone, Nokia's Symbian, RIM's BlackBerry OS. Such OS can be ...
Comments