AU - Zhou,X AU - Demetriou,S AU - He,D AU - Naveed,M AU - Pan,X AU - Wang,XF AU - Gunter,CA AU - Nahrstedt,K DO - 10.1145/2508859. To this end, we present a mitigation mechanism for achieving a delicate balance between utility and privacy of such resources. These findings call into question the soundness of the design assumptions on shared resources, and demand effective solutions. Learn more about how EndNote can help you below. If you’re happy with the trial, your subscription will roll over to a full license after 30 days. Furthermore, we show that using existing and new techniques, this zero-permission app can both determine when its target (a particular application) is running and send out collected data stealthily to a remote adversary. Just three steps to a better way of working. By monitoring these channels, an app without any permission may acquire sensitive information such as smartphone user's identity, the disease condition she is interested in, her geo-locations and her driving route, from top-of-the-line Android apps. We discovered three unexpected channels of information leaks on Android: per-app data-usage statistics, ARP information, and speaker status (on or off). In this paper, we report our work on this important yet understudied problem. However, the dramatic development in Android applications (app for short) makes available a large amount of public background information (e.g., social networks, public online services), which can potentially turn such originally harmless resource sharing into serious privacy breaches. Download RIS format (EndNote, RefMan) TY - CPAPER AB - The design of Android is based on a set of unprotected shared resources, including those inherited from Linux (e.g., Linux public directories).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |