Loading…

Android privacy

Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for ma...

Full description

Saved in:
Bibliographic Details
Main Authors: Te-En Wei, Jeng, A. B., Hahn-Ming Lee, Chih-How Chen, Chin-Wei Tien
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1837
container_issue
container_start_page 1830
container_title
container_volume 5
creator Te-En Wei
Jeng, A. B.
Hahn-Ming Lee
Chih-How Chen
Chin-Wei Tien
description Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.
doi_str_mv 10.1109/ICMLC.2012.6359654
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6359654</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6359654</ieee_id><sourcerecordid>6359654</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923</originalsourceid><addsrcrecordid>eNo1j0tLBDEQhCMquK6Dd734B2a2O-kk3cdl8LEwi5c9eFuSSQIjvpgRYf-9A64FRfFdqiilbhAaRJDVpt12baMBdeOMFWfpRFXiGcl5g8ReTtXlP5A7UwuNDmo05uVCVdP0CrM8EQsu1PX6I42fQ7r7Goef0B-u1HkJb1OujrlUu4f7XftUd8-Pm3bd1YPAd907To5jSd6miLGgsUkAJJOPTLE4YdKMfclgmSW7OFt8MAw5kGizVLd_tUPOeT9vv4fxsD_eMb-LczoT</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Android privacy</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</creator><creatorcontrib>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</creatorcontrib><description>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</description><identifier>ISSN: 2160-133X</identifier><identifier>ISBN: 1467314846</identifier><identifier>ISBN: 9781467314848</identifier><identifier>EISBN: 9781467314879</identifier><identifier>EISBN: 1467314870</identifier><identifier>EISBN: 9781467314862</identifier><identifier>EISBN: 1467314862</identifier><identifier>DOI: 10.1109/ICMLC.2012.6359654</identifier><language>eng</language><publisher>IEEE</publisher><subject>Abstracts ; Android ; Androids ; Humanoid robots ; Malware ; Privacy ; Security ; Smartphone ; Spyware</subject><ispartof>2012 International Conference on Machine Learning and Cybernetics, 2012, Vol.5, p.1830-1837</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6359654$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6359654$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Te-En Wei</creatorcontrib><creatorcontrib>Jeng, A. B.</creatorcontrib><creatorcontrib>Hahn-Ming Lee</creatorcontrib><creatorcontrib>Chih-How Chen</creatorcontrib><creatorcontrib>Chin-Wei Tien</creatorcontrib><title>Android privacy</title><title>2012 International Conference on Machine Learning and Cybernetics</title><addtitle>ICMLC</addtitle><description>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</description><subject>Abstracts</subject><subject>Android</subject><subject>Androids</subject><subject>Humanoid robots</subject><subject>Malware</subject><subject>Privacy</subject><subject>Security</subject><subject>Smartphone</subject><subject>Spyware</subject><issn>2160-133X</issn><isbn>1467314846</isbn><isbn>9781467314848</isbn><isbn>9781467314879</isbn><isbn>1467314870</isbn><isbn>9781467314862</isbn><isbn>1467314862</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j0tLBDEQhCMquK6Dd734B2a2O-kk3cdl8LEwi5c9eFuSSQIjvpgRYf-9A64FRfFdqiilbhAaRJDVpt12baMBdeOMFWfpRFXiGcl5g8ReTtXlP5A7UwuNDmo05uVCVdP0CrM8EQsu1PX6I42fQ7r7Goef0B-u1HkJb1OujrlUu4f7XftUd8-Pm3bd1YPAd907To5jSd6miLGgsUkAJJOPTLE4YdKMfclgmSW7OFt8MAw5kGizVLd_tUPOeT9vv4fxsD_eMb-LczoT</recordid><startdate>201207</startdate><enddate>201207</enddate><creator>Te-En Wei</creator><creator>Jeng, A. B.</creator><creator>Hahn-Ming Lee</creator><creator>Chih-How Chen</creator><creator>Chin-Wei Tien</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201207</creationdate><title>Android privacy</title><author>Te-En Wei ; Jeng, A. B. ; Hahn-Ming Lee ; Chih-How Chen ; Chin-Wei Tien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Abstracts</topic><topic>Android</topic><topic>Androids</topic><topic>Humanoid robots</topic><topic>Malware</topic><topic>Privacy</topic><topic>Security</topic><topic>Smartphone</topic><topic>Spyware</topic><toplevel>online_resources</toplevel><creatorcontrib>Te-En Wei</creatorcontrib><creatorcontrib>Jeng, A. B.</creatorcontrib><creatorcontrib>Hahn-Ming Lee</creatorcontrib><creatorcontrib>Chih-How Chen</creatorcontrib><creatorcontrib>Chin-Wei Tien</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Te-En Wei</au><au>Jeng, A. B.</au><au>Hahn-Ming Lee</au><au>Chih-How Chen</au><au>Chin-Wei Tien</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Android privacy</atitle><btitle>2012 International Conference on Machine Learning and Cybernetics</btitle><stitle>ICMLC</stitle><date>2012-07</date><risdate>2012</risdate><volume>5</volume><spage>1830</spage><epage>1837</epage><pages>1830-1837</pages><issn>2160-133X</issn><isbn>1467314846</isbn><isbn>9781467314848</isbn><eisbn>9781467314879</eisbn><eisbn>1467314870</eisbn><eisbn>9781467314862</eisbn><eisbn>1467314862</eisbn><abstract>Due to technological progress, today's mobile phones have evolved into technically and functionally sophisticated smartphones which have more in common with computers than with the conventional phones. As a result of their popularity and functionality, smartphones are a burgeoning target for malicious activities In Android privacy; we undertake two aspects such as user and developer. For users, a known fact in Android mobile, any app can be downloaded from Android Market without accessing a significant quantity of personal data which is different in App Store. For app developers, the App Store's method acquires developed app need to be signed using a private encryption key. Furthermore, several privacy related data such as personal information, IMEI, and location which are leaks already existing in Android Smartphone for a while. In this paper, we explain what kind of data is at risk and how to acquire them programmatically without the user's permission. We will focus on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. For example, mobile number, email accounts, keyboard cache entries, browser searches and the most recent location are sensitive data attractive to the attackers. This paper also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Some attack scenarios and recommendations are also presented.</abstract><pub>IEEE</pub><doi>10.1109/ICMLC.2012.6359654</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2160-133X
ispartof 2012 International Conference on Machine Learning and Cybernetics, 2012, Vol.5, p.1830-1837
issn 2160-133X
language eng
recordid cdi_ieee_primary_6359654
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Abstracts
Android
Androids
Humanoid robots
Malware
Privacy
Security
Smartphone
Spyware
title Android privacy
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T17%3A50%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Android%20privacy&rft.btitle=2012%20International%20Conference%20on%20Machine%20Learning%20and%20Cybernetics&rft.au=Te-En%20Wei&rft.date=2012-07&rft.volume=5&rft.spage=1830&rft.epage=1837&rft.pages=1830-1837&rft.issn=2160-133X&rft.isbn=1467314846&rft.isbn_list=9781467314848&rft_id=info:doi/10.1109/ICMLC.2012.6359654&rft.eisbn=9781467314879&rft.eisbn_list=1467314870&rft.eisbn_list=9781467314862&rft.eisbn_list=1467314862&rft_dat=%3Cieee_6IE%3E6359654%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-c68d68bfd75db1bf135d9009e47b84bf6984281cfe05889e6b9e697a380ea4923%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6359654&rfr_iscdi=true