Loading…
Android privacy
Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for ma...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1837 |
container_issue | |
container_start_page | 1830 |
container_title | |
container_volume | 5 |
creator | Te-En Wei Jeng, A. B. Hahn-Ming Lee Chih-How Chen Chin-Wei Tien |
description | Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented. |
doi_str_mv | 10.1109/ICMLC.2012.6359654 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6359654</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6359654</ieee_id><sourcerecordid>6359654</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923</originalsourceid><addsrcrecordid>eNo1j0tLBDEQhCMquK6Dd734B2a2O-kk3cdl8LEwi5c9eFuSSQIjvpgRYf-9A64FRfFdqiilbhAaRJDVpt12baMBdeOMFWfpRFXiGcl5g8ReTtXlP5A7UwuNDmo05uVCVdP0CrM8EQsu1PX6I42fQ7r7Goef0B-u1HkJb1OujrlUu4f7XftUd8-Pm3bd1YPAd907To5jSd6miLGgsUkAJJOPTLE4YdKMfclgmSW7OFt8MAw5kGizVLd_tUPOeT9vv4fxsD_eMb-LczoT</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Android privacy</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</creator><creatorcontrib>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</creatorcontrib><description>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</description><identifier>ISSN: 2160-133X</identifier><identifier>ISBN: 1467314846</identifier><identifier>ISBN: 9781467314848</identifier><identifier>EISBN: 9781467314879</identifier><identifier>EISBN: 1467314870</identifier><identifier>EISBN: 9781467314862</identifier><identifier>EISBN: 1467314862</identifier><identifier>DOI: 10.1109/ICMLC.2012.6359654</identifier><language>eng</language><publisher>IEEE</publisher><subject>Abstracts ; Android ; Androids ; Humanoid robots ; Malware ; Privacy ; Security ; Smartphone ; Spyware</subject><ispartof>2012 International Conference on Machine Learning and Cybernetics, 2012, Vol.5, p.1830-1837</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6359654$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6359654$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Te-En Wei</creatorcontrib><creatorcontrib>Jeng, A. B.</creatorcontrib><creatorcontrib>Hahn-Ming Lee</creatorcontrib><creatorcontrib>Chih-How Chen</creatorcontrib><creatorcontrib>Chin-Wei Tien</creatorcontrib><title>Android privacy</title><title>2012 International Conference on Machine Learning and Cybernetics</title><addtitle>ICMLC</addtitle><description>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</description><subject>Abstracts</subject><subject>Android</subject><subject>Androids</subject><subject>Humanoid robots</subject><subject>Malware</subject><subject>Privacy</subject><subject>Security</subject><subject>Smartphone</subject><subject>Spyware</subject><issn>2160-133X</issn><isbn>1467314846</isbn><isbn>9781467314848</isbn><isbn>9781467314879</isbn><isbn>1467314870</isbn><isbn>9781467314862</isbn><isbn>1467314862</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j0tLBDEQhCMquK6Dd734B2a2O-kk3cdl8LEwi5c9eFuSSQIjvpgRYf-9A64FRfFdqiilbhAaRJDVpt12baMBdeOMFWfpRFXiGcl5g8ReTtXlP5A7UwuNDmo05uVCVdP0CrM8EQsu1PX6I42fQ7r7Goef0B-u1HkJb1OujrlUu4f7XftUd8-Pm3bd1YPAd907To5jSd6miLGgsUkAJJOPTLE4YdKMfclgmSW7OFt8MAw5kGizVLd_tUPOeT9vv4fxsD_eMb-LczoT</recordid><startdate>201207</startdate><enddate>201207</enddate><creator>Te-En Wei</creator><creator>Jeng, A. B.</creator><creator>Hahn-Ming Lee</creator><creator>Chih-How Chen</creator><creator>Chin-Wei Tien</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201207</creationdate><title>Android privacy</title><author>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Abstracts</topic><topic>Android</topic><topic>Androids</topic><topic>Humanoid robots</topic><topic>Malware</topic><topic>Privacy</topic><topic>Security</topic><topic>Smartphone</topic><topic>Spyware</topic><toplevel>online_resources</toplevel><creatorcontrib>Te-En Wei</creatorcontrib><creatorcontrib>Jeng, A. B.</creatorcontrib><creatorcontrib>Hahn-Ming Lee</creatorcontrib><creatorcontrib>Chih-How Chen</creatorcontrib><creatorcontrib>Chin-Wei Tien</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Te-En Wei</au><au>Jeng, A. B.</au><au>Hahn-Ming Lee</au><au>Chih-How Chen</au><au>Chin-Wei Tien</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Android privacy</atitle><btitle>2012 International Conference on Machine Learning and Cybernetics</btitle><stitle>ICMLC</stitle><date>2012-07</date><risdate>2012</risdate><volume>5</volume><spage>1830</spage><epage>1837</epage><pages>1830-1837</pages><issn>2160-133X</issn><isbn>1467314846</isbn><isbn>9781467314848</isbn><eisbn>9781467314879</eisbn><eisbn>1467314870</eisbn><eisbn>9781467314862</eisbn><eisbn>1467314862</eisbn><abstract>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</abstract><pub>IEEE</pub><doi>10.1109/ICMLC.2012.6359654</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2160-133X |
ispartof | 2012 International Conference on Machine Learning and Cybernetics, 2012, Vol.5, p.1830-1837 |
issn | 2160-133X |
language | eng |
recordid | cdi_ieee_primary_6359654 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Abstracts Android Androids Humanoid robots Malware Privacy Security Smartphone Spyware |
title | Android privacy |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T17%3A50%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Android%20privacy&rft.btitle=2012%20International%20Conference%20on%20Machine%20Learning%20and%20Cybernetics&rft.au=Te-En%20Wei&rft.date=2012-07&rft.volume=5&rft.spage=1830&rft.epage=1837&rft.pages=1830-1837&rft.issn=2160-133X&rft.isbn=1467314846&rft.isbn_list=9781467314848&rft_id=info:doi/10.1109/ICMLC.2012.6359654&rft.eisbn=9781467314879&rft.eisbn_list=1467314870&rft.eisbn_list=9781467314862&rft.eisbn_list=1467314862&rft_dat=%3Cieee_6IE%3E6359654%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6359654&rfr_iscdi=true |