Shancang Li Shancang.Li@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Real-time monitoring of privacy abuses and intrusion detection in android system
Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon
Authors
Junhua Chen
Theo Spyridopoulos Theo.Spyridopoulos@uwe.ac.uk
Senior Lecturer in Forensic Computing
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Robert Ludwiniak
Gordon Russell
Abstract
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ’normal’ apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.
Citation
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 1, 2015 |
Publication Date | Jan 1, 2015 |
Journal | Human Aspects of Information Security, Privacy, and Trust |
Print ISSN | 0302-9743 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 9190 |
Pages | 379-390 |
Book Title | Human Aspects of Information Security, Privacy, and Trust |
DOI | https://doi.org/10.1007/978-3-319-20376-8_34 |
Keywords | real-time, monitoring, privacy, abuses, intrusion, detection, android |
Public URL | https://uwe-repository.worktribe.com/output/842932 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-20376-8_34 |
You might also like
Guest editorial special issue on blockchain-based secure and trusted computing for IoT
(2019)
Journal Article
Spatial-temporal data-driven service recommendation with privacy-preservation
(2019)
Journal Article
Blockchain enabled industrial Internet of Things technology
(2019)
Journal Article
Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud
(2019)
Journal Article