Recent studies have determined that many Android applications in both official and non-official online markets expose details of the users' smartphones without user consent. In this paper, we explain why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we combine static and dynamic analysis to examine Java classes and application behaviour for a set of popular, clean applications from the Finance and Games categories. We observed that all the applications in our data set which leaked information (10%) had third-party advertising libraries embedded in their respective Java packages.
History
Pagination
314-317
Location
Melbourne, Victoria
Start date
2014-10-26
End date
2014-10-29
ISBN-13
9784885522925
Language
eng
Publication classification
E Conference publication, E1 Full written paper - refereed
Copyright notice
2014, IEICE
Editor/Contributor(s)
[Unknown]
Title of proceedings
ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications
Event
Information Theory and its Applications. Symposium (2014 : Melbourne, Victoria)