Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

被引:2
|
作者
Deverashetti, Mounika [1 ]
Ranjitha, K. [1 ]
Pradeepthi, K., V [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Telengana, India
基金
中国国家自然科学基金;
关键词
Period/menstruation cycle tracking apps; Android apps; Static analysis; Dynamic analysis; Permission based; Machine learning; FORENSIC ANALYSIS; ANDROID APPS;
D O I
10.1016/j.jisa.2022.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been many incidents in the past, where user's private information, health and vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation Cycle Tracking Android apps, and analyse their security features to understand if the app developers have taken adequate care to avoid such incidents of breach or disclosure. These apps store extremely personal information of women and need to take security very seriously. We have initially applied Static Analysis techniques on these apps, and understood the various loopholes from the developer's prospective. Moreover, we used Dynamic Analysis techniques to further scrutinise the apps and exploit the discovered vulnerabilities. We found many apps are not observant in implementing minimal security features. Further, we propose a machine learning based-Ranking and Extraction of Android Permissions (REAP) framework, where we extract the permissions of these apps and apply Classification and Clustering algorithms to aid in identifying apps that are seeking more permissions and are potentially more risky. Classification accuracy of 94.52% was achieved using Naive Bayes classifier. Menstruation cycle tracking apps carry extremely private information, however, the app developers, sometimes, fail to provide a secure environment to the end-users.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques
    Deverashetti, Mounika
    Ranjitha, K.
    Pradeepthi, K.V.
    Journal of Information Security and Applications, 2022, 67
  • [2] Identification of Static and Dynamic Security Controls Using Machine Learning
    Gonzalez, Florencio J.
    Aguirre-Anaya, Eleazar
    Salinas-Rosales, Moises
    Miyaji, Atsuko
    COMPUTACION Y SISTEMAS, 2023, 27 (02): : 581 - 592
  • [3] Static and Dynamic Malware Analysis Using Machine Learning
    Ijaz, Muhammad
    Durad, Muhammad Hanif
    Ismail, Maliha
    PROCEEDINGS OF 2019 16TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2019, : 687 - 691
  • [4] Static and Dynamic Malware Analysis Using Machine Learning
    Raghuraman, Chandni
    Suresh, Sandhya
    Shivshankar, Suraj
    Chapaneri, Radhika
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 793 - 806
  • [5] Integrating Static and Dynamic Malware Analysis Using Machine Learning
    Mangialardo, R. J.
    Duarte, J. C.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (09) : 3080 - 3087
  • [6] Survey on Techniques, Applications and Security of Machine Learning Interpretability
    Ji S.
    Li J.
    Du T.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2071 - 2096
  • [7] Enhancing Security Attacks Analysis using Regularized Machine Learning Techniques
    Hagos, Desta Haileselassie
    Yazidi, Anis
    Kure, Oivind
    Engelstad, Paal E.
    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 909 - 918
  • [8] Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
    Spreitzenbarth, Michael
    Schreck, Thomas
    Echtler, Florian
    Arp, Daniel
    Hoffmann, Johannes
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 141 - 153
  • [9] Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
    Michael Spreitzenbarth
    Thomas Schreck
    Florian Echtler
    Daniel Arp
    Johannes Hoffmann
    International Journal of Information Security, 2015, 14 : 141 - 153
  • [10] Survey on applications of deep learning and machine learning techniques for cyber security
    Alghamdi M.I.
    Alghamdi, Mohammed I. (mialmushilah@bu.edu.sa), 2020, International Association of Online Engineering (14): : 210 - 224