Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

被引:2
|
作者
Deverashetti, Mounika [1 ]
Ranjitha, K. [1 ]
Pradeepthi, K., V [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Telengana, India
基金
中国国家自然科学基金;
关键词
Period/menstruation cycle tracking apps; Android apps; Static analysis; Dynamic analysis; Permission based; Machine learning; FORENSIC ANALYSIS; ANDROID APPS;
D O I
10.1016/j.jisa.2022.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been many incidents in the past, where user's private information, health and vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation Cycle Tracking Android apps, and analyse their security features to understand if the app developers have taken adequate care to avoid such incidents of breach or disclosure. These apps store extremely personal information of women and need to take security very seriously. We have initially applied Static Analysis techniques on these apps, and understood the various loopholes from the developer's prospective. Moreover, we used Dynamic Analysis techniques to further scrutinise the apps and exploit the discovered vulnerabilities. We found many apps are not observant in implementing minimal security features. Further, we propose a machine learning based-Ranking and Extraction of Android Permissions (REAP) framework, where we extract the permissions of these apps and apply Classification and Clustering algorithms to aid in identifying apps that are seeking more permissions and are potentially more risky. Classification accuracy of 94.52% was achieved using Naive Bayes classifier. Menstruation cycle tracking apps carry extremely private information, however, the app developers, sometimes, fail to provide a secure environment to the end-users.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [22] DASH Framework Using Machine Learning Techniques and Security Controls
    Shaheed, Aref
    Al-radwan, Haisam
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2022, 2022
  • [23] Combining Machine Learning and Behavior Analysis Techniques for Network Security
    Brzezinski Meyer, Maria Laura
    Labit, Yann
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 580 - 583
  • [24] Comparative analysis of machine learning techniques for enhanced vehicle tracking and analysis
    Rani, Seema
    Dalal, Sandeep
    Transportation Engineering, 2024, 18
  • [25] Motion tracking algorithms using AI and machine learning techniques
    Santos D.
    Dallos L.
    Gaona-García P.A.
    Informacion Tecnologica, 2020, 31 (03): : 23 - 38
  • [26] Modeling Virtualized Applications using Machine Learning Techniques
    Kundu, Sajib
    Rangaswami, Raju
    Gulati, Ajay
    Zhao, Ming
    Dutta, Kaushik
    ACM SIGPLAN NOTICES, 2012, 47 (07) : 3 - 14
  • [27] Learning Process Analysis using Machine Learning Techniques
    Fernandez-Robles, Laura
    Alaiz-Moreton, Hector
    Alfonso-Cendon, Javier
    Castejon-Limas, Manuel
    Panizo-Alonso, Luis
    INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2018, 34 (03) : 981 - 989
  • [28] Machine learning approach to power system dynamic security analysis
    Niimura, T
    Ko, HS
    Xu, H
    Moshref, A
    Morison, K
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 1084 - 1088
  • [29] Static Malware Analysis Using Machine and Deep Learning
    Singh, Himanshu Kumar
    Singh, Jyoti Prakash
    Tewari, Anand Shanker
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 437 - 446
  • [30] Full-Cycle Failure Analysis Using Conventional Time Series Analysis and Machine Learning Techniques
    B. Billuroglu
    V. N. Livina
    Journal of Failure Analysis and Prevention, 2022, 22 : 1121 - 1134