Discovering and understanding android sensor usage behaviors with data flow analysis

被引:0
|
作者
Xing Liu
Jiqiang Liu
Wei Wang
Yongzhong He
Xiangliang Zhang
机构
[1] Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation
[2] King Abdullah University of Science and Technology,Division of Computer, Electrical and Mathematical Sciences & Engineering
来源
World Wide Web | 2018年 / 21卷
关键词
Android system; Sensor usage; Data-flow analysis; Clustering;
D O I
暂无
中图分类号
学科分类号
摘要
Today’s Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to use these sensors. However, embedded sensors may lead to security issues, as the third-party apps can read data from these sensors without claiming any permissions. It has been proven that embedded sensors can be exploited by well designed malicious apps, resulting in leaking users’ privacy. In this work, we are motivated to provide an overview of sensor usage patterns in current apps by investigating what, why and how embedded sensors are used in the apps collected from both a Chinese app. market called “AppChina” and the official market called “Google Play”. To fulfill this goal, We develop a tool called “SDFDroid” to identify the used sensors’ types and to generate the sensor data propagation graphs in each app. We then cluster the apps to find out their sensor usage patterns based on their sensor data propagation graphs. We apply our method on 22,010 apps collected from AppChina and 7,601 apps from Google Play. Extensive experiments are conducted and the experimental results show that most apps implement their sensor related functions by using the third-party libraries. We further study the sensor usage behaviors in the third-party libraries. Our results show that the accelerometer is the most frequently used sensor. Though many third-party libraries use no more than four types of sensors, there are still some third-party libraries registering all the types of sensors recklessly. These results call for more attentions on better regulating the sensor usage in Android apps.
引用
收藏
页码:105 / 126
页数:21
相关论文
共 50 条
  • [1] Discovering and understanding android sensor usage behaviors with data flow analysis
    Liu, Xing
    Liu, Jiqiang
    Wang, Wei
    He, Yongzhong
    Zhang, Xiangliang
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 105 - 126
  • [2] Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis
    Liu, Xing
    Liu, Jiqiang
    Wang, Wei
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [3] Towards Discovering and Understanding Task Hijacking in Android
    Ren, Chuangang
    Zhang, Yulong
    Xue, Hui
    Wei, Tao
    Liu, Peng
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 945 - 959
  • [4] Customer Experience Application on Android Recording and analysis the data usage of application on Android smartphone
    Detjaroenyos, Angkana
    Worawarachai, Niravit
    Teerawisutkul, Worawee
    Pachimkul, Teerapat
    2014 THIRD ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2014, : 169 - 172
  • [5] On Understanding Permission Usage Contextuality in Android Apps
    Hossen, Md Zakir
    Mannan, Mohammad
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 232 - 242
  • [6] Discovering usage behaviors and engagement in an Educational Virtual World
    Cruz-Benito, Juan
    Theron, Roberto
    Garcia-Penalvo, Francisco J.
    Pizarro Lucas, Emiliana
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 47 : 18 - 25
  • [7] Discovering relevant sensor data by Q-analysis
    Iravani, Pejman
    ROBOCUP 2005: ROBOT SOCCER WORLD CUP IX, 2006, 4020 : 81 - 92
  • [8] Discovering and understanding the vector field using simulation in android app
    Budi, A.
    Muliyati, D.
    4TH INTERNATIONAL SEMINAR OF MATHEMATICS, SCIENCE AND COMPUTER SCIENCE EDUCATION, 2018, 1013
  • [9] Android Sensor Data Anonymization
    Claiborne, Cynthia
    Fazeen, Mohamed
    Dantu, Ram
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 469 - 471
  • [10] Effective detection of android malware based on the usage of data flow APIs and machine learning
    Wu, Songyang
    Wang, Pan
    Li, Xun
    Zhang, Yong
    INFORMATION AND SOFTWARE TECHNOLOGY, 2016, 75 : 17 - 25