TU Darmstadt / ULB / TUbiblio

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick (2014)
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
Report, Bibliographie

Kurzbeschreibung (Abstract)

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks.

Typ des Eintrags: Report
Erschienen: 2014
Autor(en): Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick
Art des Eintrags: Bibliographie
Titel: I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis
Sprache: Englisch
Publikationsjahr: 2014
Titel der Zeitschrift, Zeitung oder Schriftenreihe: arXiv preprint arXiv:1404.7431
URL / URN: http://www.abartel.net/static/p/tr-iccta.pdf
Kurzbeschreibung (Abstract):

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks.

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
LOEWE
LOEWE > LOEWE-Zentren
Zentrale Einrichtungen
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Fachbereich Informatik > EC SPRIDE
20 Fachbereich Informatik > EC SPRIDE > Secure Software Engineering
Hinterlegungsdatum: 24 Nov 2014 14:18
Letzte Änderung: 26 Jan 2024 10:04
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen