skip to main content
10.1145/3098954.3105827acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps

Published:29 August 2017Publication History

ABSTRACT

Android smartphones are ubiquitous all over the world, and organizations that turn profits out of data mining user personal information are on the rise. Many users are not aware of the risks of accepting permissions from Android apps, and the continued state of insecurity, manifested in increased level of breaches across all large organizations means that personal information is falling in the hands of malicious actors. This paper aims at shedding the light on privacy leakage in apps that target a specific demography, Arabs. The research takes into consideration apps that cater to specific cultural aspects of this region and identify how they could be abusing the trust given to them by unsuspecting users. Dynamic taint analysis is used in a virtualized environment to analyze top free apps based on popularity in Google Play store. Information presented highlights how different categories of apps leak different categories of private information.

References

  1. GSMA Intelligence, "The Mobile Economy - Arab States 2015," pp. 1--52, 2015.Google ScholarGoogle Scholar
  2. IDC, "IDC: Smartphone OS Market Share 2016, 2015." {Online}. Available: http://www.idc.com/promo/smartphone-market-share/os. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  3. Google, "Android Security: 2015 Year in Review," Tech. Rep., no. April, pp. 1--43, 2015.Google ScholarGoogle Scholar
  4. R. Unuchek and V. Chebyshev, "Mobile Malware Evolution 2015," Kaspersky Lab Secur., p. 1, 2016.Google ScholarGoogle Scholar
  5. Zscaler, "And The Mice Will 'Play'...: App Stores And The Illusion Of Control Part II | Zscaler Blog." {Online}. Available: https://www.zscaler.com/blogs/research/and-mice-will-"play"...-app-stores-and-illusion-control-part-ii. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  6. H. Bagheri, J. Garcia, S. Malek, A. Sadeghi, H. Bagheri, J. Garcia, and S. Malek, "Institute for Software Research A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Apps," Inst. Softw. Res. Univ. California, Irvine, 2016.Google ScholarGoogle Scholar
  7. X. Chen and S. Zhu, "DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications," WiSec, p. 5:1--5:12, 2015.Google ScholarGoogle Scholar
  8. L. Weichselbaum, M. Neugschwandtner, M. Lindorfer, Y. Fratantonio, V. Van Der Veen, and C. Platzer, "ANDRUBIS: Android Malware Under The Magnifying Glass," Vienna Univ. Technol. Tech. Rep. TRISECLAB-0414-001, no. February, 2012.Google ScholarGoogle Scholar
  9. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," Osdi '10, vol. 49, pp. 1--6, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Li, J. Chen, T. Spyridopoulos, P. Andriotis, R. Ludwiniak, and G. Russell, "Real-time monitoring of privacy abuses and intrusion detection in android system," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9190, pp. 379--390, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. J. Schwartz, T. Avgerinos, and D. Brumley, "All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)," Proc. - IEEE Symp. Secur. Priv., pp. 317--331, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," Analysis, vol. 44, no. May 2004, pp. 2--3, 2005.Google ScholarGoogle Scholar
  13. Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall, "Privacy scope: A precise information flow tracking system for finding application leaks," Tech. Rep. EECS-2009-145, Dep. Comput. Sci. UC Berkeley., 2009.Google ScholarGoogle Scholar
  14. G. Sarwar, O. Mehani, R. Borely, and M. A. Kaafar, "On the Effectiveness of Dynamic Taint Analysis for Protecting Against Private Information Leaks on Android-based Devices," SECRYPT 2013, 10th Int. Conf. Secur. Cryptogr., pp. 1--15, 2013.Google ScholarGoogle Scholar
  15. J. Schutte, D. Titze, and J. M. De Fuentes, "AppCaulk: Data leak prevention by injecting targeted taint tracking into android apps," Proc. - 2014 IEEE 13th Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2014, pp. 370--379, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Atamli-Reineh and A. Martin, "Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android," Int. Conf. Secur. Priv. Commun. Syst., vol. 164, pp. 605--621, 2015.Google ScholarGoogle Scholar
  17. W. Chang, B. Streiff, and C. Lin, "Efficient and extensible security enforcement using dynamic data flow analysis," Proc. 15th ACM Conf. Comput. Commun. Secur. - CCS '08, p. 39, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Ming, D. Wu, G. Xiao, J. Wang, and P. Liu, "TaintPipe: Pipelined Symbolic Taint Analysis," 24th USENIX Secur. Symp. (USENIX Secur. 15), pp. 65--80, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Ermolinskiy, "Towards Practical Taint Tracking," Eecs, 2010.Google ScholarGoogle Scholar
  20. K. Jee, V. P. Kemerlis, A. D. Keromytis, and G. Portokalidis, "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking," Ccs, pp. 235--246, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Chabbi, S. Perianayagam, G. Andrews, and S. Debray, "Efficient Dynamic Taint Analysis Using Multicore Machines," Cs.Rice.Edu, pp. 1--10, 2012.Google ScholarGoogle Scholar
  22. The Benefits of Multiple CPU Cores in Mobile Devices."Google ScholarGoogle Scholar
  23. MobileIron, "App Wrapping by AppConnect | MobileIron." {Online}. Available: https://www.mobileiron.com/en/products/appconnect. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  24. Citrix, "Wrapping Android Mobile Apps." {Online}. Available: https://docs.citrix.com/en-us/mdx-toolkit/10/xmob-mdx-kit-app-wrap-android.html. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  25. Z. Wei and D. Lie, "LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes," Proc. 4th ACM Work. Secur. Priv. Smartphones & Mob. Devices, pp. 27--38, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Qian, X. Luo, Y. Shao, and A. T. S. Chan, "On Tracking Information Flows through JNI in Android Applications."Google ScholarGoogle Scholar
  27. appanalysis.org, "TaintDroid: Realtime Privacy Monitoring on Smartphones." {Online}. Available: http://www.appanalysis.org/download.html. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  28. W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige, "TainTrace: Efficient flow tracing with dynamic binary rewriting," Proc. - Int. Symp. Comput. Commun., pp. 749--754, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. "JavaScripting.com - Request." {Online}. Available: https://www.javascripting.com/view/request. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  30. "Selenium Downloads." {Online}. Available: http://www.seleniumhqorg/download/. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  31. "Appium: Mobile App Automation Made Awesome." {Online}. Available: http://appium.io/introduction.html?lang=en. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar
  32. "Testing Support Library | Android Developers | UI Automator." {Online}. Available: https://developer.android.com/topic/libraries/testing-support-library/index.html#UIAutomator. {Accessed: 29-Mar-2017}.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
    August 2017
    853 pages
    ISBN:9781450352574
    DOI:10.1145/3098954

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 August 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ARES '17 Paper Acceptance Rate100of191submissions,52%Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader