Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

被引:2
|
作者
Deverashetti, Mounika [1 ]
Ranjitha, K. [1 ]
Pradeepthi, K., V [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Telengana, India
基金
中国国家自然科学基金;
关键词
Period/menstruation cycle tracking apps; Android apps; Static analysis; Dynamic analysis; Permission based; Machine learning; FORENSIC ANALYSIS; ANDROID APPS;
D O I
10.1016/j.jisa.2022.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been many incidents in the past, where user's private information, health and vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation Cycle Tracking Android apps, and analyse their security features to understand if the app developers have taken adequate care to avoid such incidents of breach or disclosure. These apps store extremely personal information of women and need to take security very seriously. We have initially applied Static Analysis techniques on these apps, and understood the various loopholes from the developer's prospective. Moreover, we used Dynamic Analysis techniques to further scrutinise the apps and exploit the discovered vulnerabilities. We found many apps are not observant in implementing minimal security features. Further, we propose a machine learning based-Ranking and Extraction of Android Permissions (REAP) framework, where we extract the permissions of these apps and apply Classification and Clustering algorithms to aid in identifying apps that are seeking more permissions and are potentially more risky. Classification accuracy of 94.52% was achieved using Naive Bayes classifier. Menstruation cycle tracking apps carry extremely private information, however, the app developers, sometimes, fail to provide a secure environment to the end-users.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Full-Cycle Failure Analysis Using Conventional Time Series Analysis and Machine Learning Techniques
    Billuroglu, B.
    Livina, V. N.
    JOURNAL OF FAILURE ANALYSIS AND PREVENTION, 2022, 22 (03) : 1121 - 1134
  • [32] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609
  • [33] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Hwang, Jinsoo
    Kim, Jeankyung
    Lee, Seunghwan
    Kim, Kichang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2597 - 2609
  • [34] Detecting Malicious Executable Files Based on Static-Dynamic Analysis Using Machine Learning
    Ognev, R. A.
    Zhukovskii, E. V.
    Zegzhda, D. P.
    Kiselev, A. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 852 - 864
  • [35] Static Analysis for Web Service Security - Tools & Techniques for a Secure Development Life Cycle
    Masood, Adnan
    Java, Jim
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [36] Tree-Based Ensemble Machine Learning Techniques for Power System Static Security Assessment
    Singh, Mukesh
    Chauhan, Sushil
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2022, 50 (6-7) : 359 - 373
  • [37] Applications of Machine Learning in Hardware Security
    Halak, Basel
    Mispan, Mohd Syafiq
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 212 - 213
  • [38] Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 342 - 347
  • [39] A New Iots Security Framework Using Hybrid Machine Learning Techniques
    Kokaz, Amjed Sabbar
    Turkben, Ayca Kurnaz
    IETE JOURNAL OF RESEARCH, 2025,
  • [40] HUMAN DETECTION AND MOTION TRACKING USING MACHINE LEARNING TECHNIQUES: A REVIEW
    Mahajan, Rohini
    Padha, Devanand
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 127 - 131