Discovering and understanding android sensor usage behaviors with data flow analysis

被引:0
|
作者
Xing Liu
Jiqiang Liu
Wei Wang
Yongzhong He
Xiangliang Zhang
机构
[1] Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation
[2] King Abdullah University of Science and Technology,Division of Computer, Electrical and Mathematical Sciences & Engineering
来源
World Wide Web | 2018年 / 21卷
关键词
Android system; Sensor usage; Data-flow analysis; Clustering;
D O I
暂无
中图分类号
学科分类号
摘要
Today’s Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to use these sensors. However, embedded sensors may lead to security issues, as the third-party apps can read data from these sensors without claiming any permissions. It has been proven that embedded sensors can be exploited by well designed malicious apps, resulting in leaking users’ privacy. In this work, we are motivated to provide an overview of sensor usage patterns in current apps by investigating what, why and how embedded sensors are used in the apps collected from both a Chinese app. market called “AppChina” and the official market called “Google Play”. To fulfill this goal, We develop a tool called “SDFDroid” to identify the used sensors’ types and to generate the sensor data propagation graphs in each app. We then cluster the apps to find out their sensor usage patterns based on their sensor data propagation graphs. We apply our method on 22,010 apps collected from AppChina and 7,601 apps from Google Play. Extensive experiments are conducted and the experimental results show that most apps implement their sensor related functions by using the third-party libraries. We further study the sensor usage behaviors in the third-party libraries. Our results show that the accelerometer is the most frequently used sensor. Though many third-party libraries use no more than four types of sensors, there are still some third-party libraries registering all the types of sensors recklessly. These results call for more attentions on better regulating the sensor usage in Android apps.
引用
收藏
页码:105 / 126
页数:21
相关论文
共 50 条
  • [31] Discovering software vulnerabilities using data-flow analysis and machine learning
    Kronjee, Jorrit
    Hommersom, Arjen
    Vranken, Harald
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [32] Understanding the Usage of Content in a Mental Health Intervention for Depression: An Analysis of Log Data
    Van Gemert-Pijnen, Julia E. W. C.
    Kelders, Saskia M.
    Bohlmeijer, Ernst T.
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2014, 16 (01)
  • [33] Making Android Apps Data-Leak-Safe by Data Flow Analysis and Code Injection
    Ascia, Giuseppe
    Catania, Vincenzo
    Di Natale, Raffaele
    Fornaia, Andrea
    Mongiovi, Misael
    Monteleone, Salvatore
    Pappalardo, Giuseppe
    Tramontana, Emiliano
    2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2016, : 205 - 210
  • [34] Discovering the difference in the usage of symbol toward improving data quality in databases
    Yoshida, T
    Ohnishi, K
    Nishida, S
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 190 - 193
  • [35] DroidRista: a highly precise static data flow analysis framework for android applications
    Areej Alzaidi
    Suhair Alshehri
    Seyed M. Buhari
    International Journal of Information Security, 2020, 19 : 523 - 536
  • [36] AndroEvolve: automated Android API update with data flow analysis and variable denormalization
    Stefanus A. Haryono
    Ferdian Thung
    David Lo
    Lingxiao Jiang
    Julia Lawall
    Hong Jin Kang
    Lucas Serrano
    Gilles Muller
    Empirical Software Engineering, 2022, 27
  • [37] DroidRista: a highly precise static data flow analysis framework for android applications
    Alzaidi, Areej
    Alshehri, Suhair
    Buhari, Seyed M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (05) : 523 - 536
  • [38] AndroEvolve: automated Android API update with data flow analysis and variable denormalization
    Haryono, Stefanus A.
    Thung, Ferdian
    Lo, David
    Jiang, Lingxiao
    Lawall, Julia
    Kang, Hong Jin
    Serrano, Lucas
    Muller, Gilles
    EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (03)
  • [39] Understanding Research Data Licensing in the Usage Categories
    Yang, Li
    Kipp, Margaret E. I.
    Chen, Jianyao
    Proceedings of the Association for Information Science and Technology, 2024, 61 (01) : 1153 - 1155
  • [40] On Understanding Data Worker Interaction Behaviors
    Han, Lei
    Chen, Tianwa
    Demartini, Gianluca
    Indulska, Marta
    Sadiq, Shazia
    PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20), 2020, : 269 - 278