Skip to main content

Research Repository

Advanced Search

Real-time monitoring of privacy abuses and intrusion detection in android system

Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon

Authors

Shancang Li

Junhua Chen

Profile Image

Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security

Robert Ludwiniak

Gordon Russell



Abstract

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘normal’ apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.

Citation

Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

Journal Article Type Conference Paper
Acceptance Date Oct 1, 2015
Publication Date Jan 1, 2015
Deposit Date Sep 19, 2016
Journal Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Print ISSN 0302-9743
Electronic ISSN 1611-3349
Publisher Springer Verlag
Peer Reviewed Peer Reviewed
Volume 9190
Pages 379-390
Book Title Human Aspects of Information Security, Privacy, and Trust
DOI https://doi.org/10.1007/978-3-319-20376-8_34
Keywords real-time, monitoring, privacy, abuses, intrusion, detection, android
Public URL https://uwe-repository.worktribe.com/output/842932
Publisher URL http://dx.doi.org/10.1007/978-3-319-20376-8_34