Loading…

Android privacy

Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for ma...

Full description

Saved in:
Bibliographic Details
Main Authors: Te-En Wei, Jeng, A. B., Hahn-Ming Lee, Chih-How Chen, Chin-Wei Tien
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.
ISSN:2160-133X
DOI:10.1109/ICMLC.2012.6359654