ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Analyzing User Awareness of Privacy Data Leak in Mobile Applications
Cited 23 time in scopus Download 19 time Share share facebook twitter linkedin kakaostory
Authors
Youngho Kim, Tae Oh, Jeongnyeo Kim
Issue Date
2015-12
Citation
Mobile Information Systems, v.2015, pp.1-12
ISSN
1574-017X
Publisher
Hindawi Publishing
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1155/2015/369489
Abstract
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT) era, a cloud computing provides an effective platform without human intervention to build a resource-oriented security solution. However, existing malware detection methods are constrained by a vague situation of information leaks. The main goal of this paper is to measure a degree of hiding intention for the mobile application (app) to keep its leaking activity invisible to the user. For real-world application test, we target Android applications, which unleash user privacy data. With the TaintDroid-ported emulator, we make experiments about the timing distance between user events and privacy leaks. Our experiments with Android apps downloaded from the Google Play show that most of leak cases are driven by user explicit events or implicit user involvement which make the user aware of the leakage. Those findings can assist a malware detection system in reducing the rate of false positive by considering malicious intentions. From the experiment, we understand better about app's internal operations as well. As a case study, we also presents a cloud-based dynamic analysis framework to perform a traffic monitor.
KSP Keywords
Case studies, Cloud Computing, Cloud-based, Computing power, Data Leak, Detection Method, Dynamic analysis, False positive, Google play, Internet of thing(IoT), Intrusion detection system(IDS)
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY