http://10.10.120.238:8080/xmlui/handle/123456789/176
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jain V. | en_US |
dc.contributor.author | Laxmi V. | en_US |
dc.contributor.author | Gaur M.S. | en_US |
dc.contributor.author | Mosbah M. | en_US |
dc.date.accessioned | 2023-11-30T08:12:22Z | - |
dc.date.available | 2023-11-30T08:12:22Z | - |
dc.date.issued | 2019 | - |
dc.identifier.isbn | 978-9811375606 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.other | EID(2-s2.0-85065788680) | - |
dc.identifier.uri | https://dx.doi.org/10.1007/978-981-13-7561-3_16 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/176 | - |
dc.description.abstract | An app named “Aqua Mail” is a Google play store app with millions of downloads. It allows the user to manage Google account mails. For caching purposes, it stores the mails in a content provider protected with a custom permission rather than Android defined permission to access mails (MANAGE_ACCOUNTS). Another app named “Enhanced SMS and call” can access mails directly by obtaining the permission of reading the custom content provider of Aqua Mail. Google is not aware of the fact that any other app is accessing the mails. In order to detect such flows, a precise inter-app analysis is needed to identify leakage from source in one app to sink in another app. In this paper, we present an extension of a static analysis technique named SniffDroid to detect the inter-app privacy leaks in Android. Our technique models Android apps and Android permissions as the automaton and utilizes the intersection property of automaton to detect privacy leakage. To assess the performance of the proposed approach, we analyzed Droidbench samples, self-made apps and Google playstore apps. We created novel samples of leakage through a chain of apps and analyzed them using open-source existing state-of-art approaches. We found that none of them could detect the leakage paths. The proposed approach detects the inter-app privacy leakage with 100% accuracy. © Springer Nature Singapore Pte Ltd. 2019. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Verlag | en_US |
dc.source | Communications in Computer and Information Science | en_US |
dc.title | APPLADroid: Automaton based inter-app privacy leak analysis for android | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.