Shancang Li
Real-time monitoring of privacy abuses and intrusion detection in android system
Li, Shancang; Chen, Junhua; Spyridopoulos, Theodoros; Andriotis, Panagiotis; Ludwiniak, Robert; Russell, Gordon
Authors
Junhua Chen
Theodoros Spyridopoulos
Panagiotis Andriotis
Robert Ludwiniak r.ludwiniak@napier.ac.uk
Lecturer
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Abstract
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technology, service binding, and service proxy in Android system, which are widely used by normal apps to steal privacy information. A real-time monitoring system (app) is developed on Android system to monitor potential privacy data abuse. The app is able to monitor permission requests for all installed apps as well as analyse the potential privacy abuse behaviors.
Citation
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015, August). Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at International Conference on Human Aspects of Information Security, Privacy, and Trust, Los Angeles, CA, USA
Presentation Conference Type | Conference Paper (Published) |
---|---|
Conference Name | International Conference on Human Aspects of Information Security, Privacy, and Trust |
Start Date | Aug 2, 2015 |
End Date | Aug 7, 2015 |
Online Publication Date | Jul 21, 2015 |
Publication Date | Jul 21, 2015 |
Deposit Date | Aug 27, 2015 |
Electronic ISSN | 1611-3349 |
Publisher | Springer |
Peer Reviewed | Peer Reviewed |
Volume | 9190 |
Pages | 379-390 |
Series Title | Lecture Notes in Computer Science |
Series Number | 9190 |
Series ISSN | 0302-9743 |
Book Title | Human Aspects of Information Security, Privacy, and Trust |
ISBN | 978-3-319-20375-1, 978-3-319-20376-8 |
DOI | https://doi.org/10.1007/978-3-319-20376-8_34 |
Keywords | Cybersecurity; risk assessement; organisational change; data security; Android software; computer programming and software; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8755 |
You might also like
A forensic image description language for generating test images.
(2012)
Presentation / Conference Contribution
Cloud-based digital forensics evaluation test (D-FET) platform.
(2011)
Presentation / Conference Contribution
Student perception of on-line lectures with a blended learning environment.
(2010)
Presentation / Conference Contribution
Towards An SDN Assisted IDS
(2021)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search