Shancang Li
Real-time monitoring of privacy abuses and intrusion detection in android system
Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon
Authors
Junhua Chen
Theodoros Spyridopoulos
Panagiotis Andriotis
Robert Ludwiniak r.ludwiniak@napier.ac.uk
Lecturer
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Abstract
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.
Citation
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
Conference Name | International Conference on Human Aspects of Information Security, Privacy, and Trust |
---|---|
Conference Location | Los Angeles, CA, USA |
Start Date | Aug 2, 2015 |
End Date | Aug 7, 2015 |
Online Publication Date | Jul 21, 2015 |
Publication Date | Jul 21, 2015 |
Deposit Date | Aug 27, 2015 |
Electronic ISSN | 1611-3349 |
Publisher | Springer |
Peer Reviewed | Peer Reviewed |
Volume | 9190 |
Pages | 379-390 |
Series Title | Lecture Notes in Computer Science |
Series Number | 9190 |
Series ISSN | 0302-9743 |
Book Title | Human Aspects of Information Security, Privacy, and Trust |
ISBN | 978-3-319-20375-1, 978-3-319-20376-8 |
DOI | https://doi.org/10.1007/978-3-319-20376-8_34 |
Keywords | Cybersecurity; risk assessement; organisational change; data security; Android software; computer programming and software; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8755 |
You might also like
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
(2016)
Journal Article
Modelling and Characterization of NAND Flash Memory Channels.
(2015)
Journal Article
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.
(2016)
Journal Article
Monitoring Users’ Behavior: Anti-Immigration Speech Detection on Twitter
(2020)
Journal Article