Shancang Li
Real-time monitoring of privacy abuses and intrusion detection in android system
Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon
Authors
Junhua Chen
Theo Spyridopoulos Theo.Spyridopoulos@uwe.ac.uk
Occasional Associate Lecturer - CSCT FET
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Robert Ludwiniak
Gordon Russell
Abstract
© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘normal’ apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.
Citation
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34
Journal Article Type | Conference Paper |
---|---|
Acceptance Date | Oct 1, 2015 |
Publication Date | Jan 1, 2015 |
Deposit Date | Sep 19, 2016 |
Journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Print ISSN | 0302-9743 |
Electronic ISSN | 1611-3349 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 9190 |
Pages | 379-390 |
Book Title | Human Aspects of Information Security, Privacy, and Trust |
DOI | https://doi.org/10.1007/978-3-319-20376-8_34 |
Keywords | real-time, monitoring, privacy, abuses, intrusion, detection, android |
Public URL | https://uwe-repository.worktribe.com/output/842932 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-20376-8_34 |
You might also like
Bu-Dash: A universal and dynamic graphical password scheme
(2022)
Conference Proceeding
Feature vulnerability and robustness assessment against adversarial machine learning attacks
(2021)
Conference Proceeding