首页> 外文学位 >Dataflow analysis techniques for detecting mobile application privacy leaks.
【24h】

Dataflow analysis techniques for detecting mobile application privacy leaks.

机译:用于检测移动应用程序隐私泄漏的数据流分析技术。

获取原文
获取原文并翻译 | 示例

摘要

Smartphone and tablet users typically store a variety of sensitive information on their devices, including contact information, photos, SMS messages, and custom data used by various applications. On Android devices, the data is stored in SQLite databases which applications access by constructing and executing queries, either directly or via Android content provider API calls. Before installing an application that uses a content provider, a user must grant permission for the application to read and/or write the associated data. Many users grant permission with little understanding of the risks. Even more savvy users cannot make well-informed decisions, as they are only given very coarse information about what data the application accesses.;To provide users with more detailed information about how Android apps access and modify stored data, we have developed AQUA, the Android QUery Analyzer. AQUA analyzes application binary code, performing a lightweight static analysis to determine possible values of string variables that are incorporated into queries. AQUA reports on the content providers used and the database tables/attributes accessed and/or updated, allowing users to make more informed decisions about whether to grant permissions. This work describes AQUA's design and evaluates AQUA's accuracy and performance by using it to analyze 105 popular apps downloaded from Google Play.;We then describe an enhanced approach that overcomes some of the obstacles that AQUA was facing. This extension closely works with AQUA, performing call graph analysis to determine possible values of string that are associated with queries. Our implementation more accurately reports on user private data use than original AQUA does. This research includes implementation and evaluation on accuracy and performance of the our approach by using it to analyze 100 popular apps downloaded from Google Play.;Finally, we propose an efficient and accurate approach for detecting malicious Android apps that leak sensitive data of the user. The weakness of the previous approach was extra resources consumption when it only needs to identify whether an app includes malicious dataflow. Our new technique performs flow-sensitive and type-sensitive inter-procedural call analysis. The prototype of our algorithm successful identifies suspicious apps that includes activities of leaking sensitive contents of the user. Accuracy and performance of the algorithm is evaluated by running a prototype implementation on on 400 real apps downloaded from Google Play and third party app stores.
机译:智能手机和平板电脑用户通常在其设备上存储各种敏感信息,包括联系信息,照片,SMS消息以及各种应用程序使用的自定义数据。在Android设备上,数据存储在SQLite数据库中,应用程序可以通过直接或通过Android内容提供商API调用来构造和执行查询,从而访问应用程序。在安装使用内容提供程序的应用程序之前,用户必须授予该应用程序读取和/或写入关联数据的权限。许多用户在几乎不了解风险的情况下授予许可。甚至更精明的用户也无法做出明智的决定,因为他们只能获得有关应用程序访问哪些数据的非常粗略的信息。;为了向用户提供有关Android应用程序如何访问和修改存储的数据的更详细的信息,我们开发了AQUA, Android QUery Analyzer。 AQUA分析应用程序二进制代码,执行轻量级的静态分析,以确定合并到查询中的字符串变量的可能值。 AQUA报告所使用的内容提供商以及访问和/或更新的数据库表/属性,从而使用户可以就是否授予许可做出更明智的决定。这项工作描述了AQUA的设计,并通过使用它来分析从Google Play下载的105个流行应用程序来评估AQUA的准确性和性能。然后,我们介绍了一种克服了AQUA面临的一些障碍的增强方法。此扩展与AQUA紧密配合,执行调用图分析以确定与查询关联的字符串的可能值。与原始AQUA相比,我们的实施更准确地报告了用户私人数据的使用情况。这项研究包括对我们的方法的准确性和性能的实施和评估,方法是使用它来分析从Google Play下载的100个流行应用。最后,我们提出了一种有效且准确的方法,用于检测泄漏用户敏感数据的恶意Android应用。前一种方法的缺点是,当仅需要确定应用程序是否包含恶意数据流时,就会消耗额外的资源。我们的新技术执行流程敏感和类型敏感的过程间调用分析。我们算法的原型成功地识别了可疑应用程序,其中包括泄漏用户敏感内容的活动。通过在从Google Play和第三方应用商店下载的400个真实应用上运行原型实现,来评估算法的准确性和性能。

著录项

  • 作者

    Kim, Chon Ju.;

  • 作者单位

    Polytechnic Institute of New York University.;

  • 授予单位 Polytechnic Institute of New York University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 91 p.
  • 总页数 91
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号