Matches in SemOpenAlex for { <https://semopenalex.org/work/W777262422> ?p ?o ?g. }
Showing items 1 to 70 of
70
with 100 items per page.
- W777262422 abstract "The success of the Android OS in its user base as well as in its developer base can partly be attributed to its communication model, named Inter-Component Communication (ICC), which promotes the development of loosely-coupled applications. By dividing applications into components that can exchange data within a single application and across several applications, Android encourages software reuse, and thus reduces developer burden. Unfortunately, the ICC model, which provides a message passing mechanism for data exchange among components, can be misused by malicious apps to threaten user privacy. Indeed, researchers have shown that Android apps frequently send users private data outside the device without their prior consent. Those applications are said to leak private data [2]. However, there is still a lack of a comprehensive study on the characteristics of the usage of ICCs by Android malware. Typically, what is the extent of the presence of privacy leaks in Android malware? To answer such a question, an Android analysis tool has to be developed for tracking privacy leaks. Although, most of the privacy leaks are simple, i.e., easily identifiable as they operate within a single component. Thus, analyzing components separately is not enough to detect leaks: it is necessary to perform an inter-component analysis of applications. Android app analysts could leverage such a tool to identify malicious apps that leak private data. For the tool to be useful, it has to be highly precise and minimize the false positive rate when reporting applications leaking private data. Thus, we propose IccTA1 , an Inter-component communication Taint Analysis tool, for a sound and precise detection of ICC links and leaks. Although our approach is generic and can be used for any data-flow analysis, we focus in this paper on using IccTA to detect ICC-based privacy leaks. we test IccTA on 15,000 real-world apps randomly selected from Google Play market in which we detect 337 apps with 2,395 ICC leaks. We also launch IccTA on the MalGenome [5] set containing 1260 malware, where IccTA reports 108 apps with 534 ICC leaks. By comparing the detecting rate r = # of detected apps # of tested apps of the two data sets, we found that rMalGenome = 8.6% is much higher than rGoogleP lay = 2.2%. Thus, we can conclude that malware are using ICC to leak private data more than benign apps, making ICC a potential feature for malware 1 https://sites.google.com/site/icctawebpage/ detection. This paper is an extended abstract version of our research paper [3], where interested readers can find more details of this work." @default.
- W777262422 created "2016-06-24" @default.
- W777262422 creator A5027475930 @default.
- W777262422 creator A5040326968 @default.
- W777262422 creator A5040574362 @default.
- W777262422 creator A5082835974 @default.
- W777262422 date "2015-03-01" @default.
- W777262422 modified "2023-10-16" @default.
- W777262422 title "Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps" @default.
- W777262422 cites W1630356589 @default.
- W777262422 cites W2047877275 @default.
- W777262422 cites W2077202047 @default.
- W777262422 cites W2125011234 @default.
- W777262422 cites W2166743230 @default.
- W777262422 hasPublicationYear "2015" @default.
- W777262422 type Work @default.
- W777262422 sameAs 777262422 @default.
- W777262422 citedByCount "0" @default.
- W777262422 crossrefType "journal-article" @default.
- W777262422 hasAuthorship W777262422A5027475930 @default.
- W777262422 hasAuthorship W777262422A5040326968 @default.
- W777262422 hasAuthorship W777262422A5040574362 @default.
- W777262422 hasAuthorship W777262422A5082835974 @default.
- W777262422 hasConcept C111919701 @default.
- W777262422 hasConcept C127413603 @default.
- W777262422 hasConcept C136764020 @default.
- W777262422 hasConcept C206588197 @default.
- W777262422 hasConcept C2989133298 @default.
- W777262422 hasConcept C38652104 @default.
- W777262422 hasConcept C41008148 @default.
- W777262422 hasConcept C541664917 @default.
- W777262422 hasConcept C548081761 @default.
- W777262422 hasConcept C557433098 @default.
- W777262422 hasConceptScore W777262422C111919701 @default.
- W777262422 hasConceptScore W777262422C127413603 @default.
- W777262422 hasConceptScore W777262422C136764020 @default.
- W777262422 hasConceptScore W777262422C206588197 @default.
- W777262422 hasConceptScore W777262422C2989133298 @default.
- W777262422 hasConceptScore W777262422C38652104 @default.
- W777262422 hasConceptScore W777262422C41008148 @default.
- W777262422 hasConceptScore W777262422C541664917 @default.
- W777262422 hasConceptScore W777262422C548081761 @default.
- W777262422 hasConceptScore W777262422C557433098 @default.
- W777262422 hasLocation W7772624221 @default.
- W777262422 hasOpenAccess W777262422 @default.
- W777262422 hasPrimaryLocation W7772624221 @default.
- W777262422 hasRelatedWork W124941384 @default.
- W777262422 hasRelatedWork W1935358945 @default.
- W777262422 hasRelatedWork W2027538101 @default.
- W777262422 hasRelatedWork W204860813 @default.
- W777262422 hasRelatedWork W2077568170 @default.
- W777262422 hasRelatedWork W2321998244 @default.
- W777262422 hasRelatedWork W2334597393 @default.
- W777262422 hasRelatedWork W2609012087 @default.
- W777262422 hasRelatedWork W2612281133 @default.
- W777262422 hasRelatedWork W2728620334 @default.
- W777262422 hasRelatedWork W2739519788 @default.
- W777262422 hasRelatedWork W2752818243 @default.
- W777262422 hasRelatedWork W2797940437 @default.
- W777262422 hasRelatedWork W2805398154 @default.
- W777262422 hasRelatedWork W2808961996 @default.
- W777262422 hasRelatedWork W2906347220 @default.
- W777262422 hasRelatedWork W3008828998 @default.
- W777262422 hasRelatedWork W3009478589 @default.
- W777262422 hasRelatedWork W3180258988 @default.
- W777262422 hasRelatedWork W335253378 @default.
- W777262422 isParatext "false" @default.
- W777262422 isRetracted "false" @default.
- W777262422 magId "777262422" @default.
- W777262422 workType "article" @default.