Authors
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, X Sean Wang
Publication date
2013/11/4
Conference
ACM SIGSAC conference on Computer & Communications Security (CCS 2013)
Pages
1043-1054
Description
Android phones often carry personal information, attracting malicious developers to embed code in Android applications to steal sensitive data. With known techniques in the literature, one may easily determine if sensitive data is being transmitted out of an Android phone. However, transmission of sensitive data in itself does not necessarily indicate privacy leakage; a better indicator may be whether the transmission is by user intention or not. When transmission is not intended by the user, it is more likely a privacy leakage. The problem is how to determine if transmission is user intended. As a first solution in this space, we present a new analysis framework called AppIntent. For each data transmission, AppIntent can efficiently provide a sequence of GUI manipulations corresponding to the sequence of events that lead to the data transmission, thus helping an analyst to determine if the data transmission is user …
Total citations
201220132014201520162017201820192020202120222023202422347484966852343335229
Scholar articles
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang - Proceedings of the 2013 ACM SIGSAC conference on …, 2013