Repackaging Android applications for auditing access to private data - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Repackaging Android applications for auditing access to private data

Résumé

One of the most important threats for Android users is the collection of private data by malware put on the market. Most of the proposed approaches that help to guarantee the user's privacy rely on modified versions of the Android operating system. In this paper, we propose to automatically detect when an application accesses private data and to log this access in a third-party application. This detection should be performed without any modification to the operating system. The proposed methodology relies on the repackaging of a compiled application and the injection of a reporter at bytecode level. Thus, such a methodology enables the user to audit suspicious applications that ask permissions to access private data and to know if such an access has occurred. We show that the proposed methodology can also be implemented as an IPS, in order to prevent such accesses. Experimental results show the efficiency of the methodology on a set of 18 regular applications of the Android market that deal with contacts. Our prototype detected 66% of the accesses to the user's contacts. We also experimented the detection of privacy violations with 5 known malware that send premium-rate SMS.
Fichier non déposé

Dates et versions

hal-00721407 , version 1 (27-07-2012)

Identifiants

Citer

Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande. Repackaging Android applications for auditing access to private data. IWSMA 2012, Aug 2012, Prague, Czech Republic. pp.388-396, ⟨10.1109/ARES.2012.74⟩. ⟨hal-00721407⟩
125 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More