Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system app is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.

[1]  Yajin Zhou,et al.  Owner-Centric Protection of Unstructured Data on Smartphones , 2014, TRUST.

[2]  Ninghui Li,et al.  Effective Risk Communication for Android Apps , 2013, IEEE Transactions on Dependable and Secure Computing.

[3]  Yajin Zhou,et al.  DIVILAR: diversifying intermediate language for anti-repackaging on android platform , 2014, CODASPY '14.

[4]  Yidong Cui,et al.  A security assessment method for Android applications based on permission model , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[5]  Albert B. Jeng,et al.  Android privacy , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[6]  Jiaming He,et al.  Extending Android Security Enforcement with a Security Distance Model , 2011, 2011 International Conference on Internet Technology and Applications.

[7]  Hiroki Kuzuno,et al.  Signature generation for sensitive information leakage in android applications , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).

[8]  Xiaojiang Du,et al.  Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.