Shancang Li
Real-time monitoring of privacy abuses and intrusion detection in android system
Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon
Authors
Junhua Chen
Theo Spyridopoulos Theo.Spyridopoulos@uwe.ac.uk
Occasional Associate Lecturer - CSCT FET
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Robert Ludwiniak
Gordon Russell
Abstract
© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘normal’ apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.
Citation
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 1, 2015 |
Publication Date | Jan 1, 2015 |
Journal | Human Aspects of Information Security, Privacy, and Trust |
Print ISSN | 0302-9743 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 9190 |
Pages | 379-390 |
Book Title | Human Aspects of Information Security, Privacy, and Trust |
DOI | https://doi.org/10.1007/978-3-319-20376-8_34 |
Keywords | real-time, monitoring, privacy, abuses, intrusion, detection, android |
Public URL | https://uwe-repository.worktribe.com/output/842932 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-20376-8_34 |
You might also like
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models
(2017)
Presentation / Conference
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
(2017)
Conference Proceeding
Privacy decision-making in the digital era: A game theoretic review
(2017)
Journal Article
A comparative study of android users’ privacy preferences under the runtime permission model
(2017)
Journal Article