Discovering and understanding android sensor usage behaviors with data flow analysis

被引:0
|
作者
Xing Liu
Jiqiang Liu
Wei Wang
Yongzhong He
Xiangliang Zhang
机构
[1] Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation
[2] King Abdullah University of Science and Technology,Division of Computer, Electrical and Mathematical Sciences & Engineering
来源
World Wide Web | 2018年 / 21卷
关键词
Android system; Sensor usage; Data-flow analysis; Clustering;
D O I
暂无
中图分类号
学科分类号
摘要
Today’s Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to use these sensors. However, embedded sensors may lead to security issues, as the third-party apps can read data from these sensors without claiming any permissions. It has been proven that embedded sensors can be exploited by well designed malicious apps, resulting in leaking users’ privacy. In this work, we are motivated to provide an overview of sensor usage patterns in current apps by investigating what, why and how embedded sensors are used in the apps collected from both a Chinese app. market called “AppChina” and the official market called “Google Play”. To fulfill this goal, We develop a tool called “SDFDroid” to identify the used sensors’ types and to generate the sensor data propagation graphs in each app. We then cluster the apps to find out their sensor usage patterns based on their sensor data propagation graphs. We apply our method on 22,010 apps collected from AppChina and 7,601 apps from Google Play. Extensive experiments are conducted and the experimental results show that most apps implement their sensor related functions by using the third-party libraries. We further study the sensor usage behaviors in the third-party libraries. Our results show that the accelerometer is the most frequently used sensor. Though many third-party libraries use no more than four types of sensors, there are still some third-party libraries registering all the types of sensors recklessly. These results call for more attentions on better regulating the sensor usage in Android apps.
引用
收藏
页码:105 / 126
页数:21
相关论文
共 50 条
  • [21] Analysis and Prediction of Application Usage in Android Phones
    Acharya, Shreenath
    Shenoy, Asha
    Lewis, Macwin
    Desai, Namrata
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 530 - 534
  • [22] Understanding IPv6 Usage: Communities and Behaviors
    Huang, Shaojun
    An, Chaugqing
    Wang, Hui
    Yang, Jiahai
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 256 - +
  • [23] A New Perspective for Understanding Data Flow Analysis
    Lin, Hai
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1522 - 1524
  • [25] Understanding Base Stations' Behaviors and Activities with Big Data Analysis
    Jiang, Dingde
    Huo, Liuwei
    Song, Houbing
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [26] Detecting Android application malicious behaviors based on the analysis of control flows and data flows
    Zegzhda, Peter
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Dremov, Andrew
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 280 - 283
  • [27] SMASheD: Sniffing and Manipulating Android Sensor Data
    Mohamed, Manar
    Shrestha, Babins
    Saxena, Nitesh
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 152 - 159
  • [28] Automatically Detecting Malicious Sensitive Data Usage in Android Applications
    Yan, Hongbing
    Xiong, Yan
    Huang, Wenchao
    Huang, Jianmeng
    Meng, Zhaoyi
    2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, : 102 - 107
  • [29] Security analysis and evaluation for the usage of settings mechanism in android
    Lu Y.
    Ying L.
    Su P.
    Feng D.
    Jing E.
    Gu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2248 - 2261
  • [30] Malaysian women entrepreneurs: understanding the ICT usage behaviors and drivers
    Ndubisi, Nelson Oly
    Kahraman, Cengiz
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2005, 18 (06) : 721 - +