999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Design and Implementation of Privacy Impact Assessment for Android Mobile Devices

2016-07-21 05:34:32CHENKuan-LinYANGChung-Huang
ZTE Communications 2016年5期

CHEN Kuan-Lin YANG Chung-Huang

Abstract There are a lot of personal information stored in our smartphones, for instance, contacts, messages, photos, banking credentials and social network access. Therefore, ensuring personal data safety is a critical research and practical issue. The objective of this paper is to evaluate the influence of personal data security and decrease the privacy risks in the Android system. We apply the concept of privacy impact assessment (PIA) to design a system, which identifies permission requirements of apps, detects the potential activities from the logger and analyses the configuration settings. The system provides a user?friendly interface for users to get in?depth knowledge of the impact of privacy risk, and it could run on Android devices without USB teleport and network connection to avoid other problems. Our research finds that many apps announce numerous unnecessary permissions, and the application installing confirmation dialog does not show all requirement permissions when apps are installed first time.

Keywords privacy impact assessment; privacy risk; personal information; Android permission; configuration settings

1 Introduction

The sales of smartphones reached 1.2 billion units in 2014 [1]. According to the data from International Data Corporation (IDC), the worldwide smartphone market grew 13% year over year in 2015 Q2 [2]. Particularly, Android dominated the market with an 82.8% share in 2015 Q2 [2], leaving its competitors iOS, Windows mobile OS and Blackberry far behind.

Smartphones have become widespread because of a wide range of connectivity options such as Wi?Fi, GPS, Bluetooth and near field communication (NFC). However, ubiquitous internet connectivity and availability of personal information such as contacts, messages, photos, banking credentials and social network access has attracted the attention of malware developers towards the mobile devices and Android.

Internet security threat reports say that there are too many apps containing malware. Symantec has analysed about 6.3 million apps in 2014, and there are more than one million apps that are classified as malware which included 46 new families of Android malware [3]. In addition, there are approximately 2.3 million suspect apps. Technically, they are not malware, but they display undesirable behaviour, such as bombarding the user with advertising.

In order to avoid malicious apps from the official Google Play, Google introduced a security service named Bouncer [4], which can quietly and automatically scan apps. Any found malicious apps or malware that may be detrimental to users, damage the system or tries to steal privacy information, will be removed from Google Play.

Although Google had done a good job of keeping malware out of the store, the mobile threat report published by Lookout Mobile Security in 2014 showed that Android mobile devices encountered 75% more malware than that in 2013 [5]. Therefore, it is necessary to find more detail information about system and apps to avoid using malicious apps and protect personal or privacy information from being stolen.

In this paper, we propose a privacy impact assessment ( PIA) system on Android mobile devices. The proposed framework evaluates the Android security risks based on permission request patterns of applications and configuration settings by users, which aims to minimise privacy risks. We also scan the log messages by a logcat command in Android shell, which helps us know what potential activities are running.

The rest of the paper is organized as follows. The second chapter introduces related work. The third chapter is the literature review about background information. The fourth chapter describes the system architecture and assessment rules. The fifth chapter demonstrates the design and implementation of PIA. The sixth chapter is the practical test results including system performance. The seventh chapter is the conclusion and future work.

2 Related Works

2.1 Risk Assessment for Permissions

Yang Wang et al. did a quantitative security risk assessment for Android permissions and applications called DroidRisk [6]. Its objective is to improve the efficiency of Android permission system. They used two data sets with 27,274 benign apps from Google Play and 1260 Android malware samples, extracted the name, category, and requested permissions of each app by a crawler, and found the most significant differences between benign apps and malware.

The results demonstrate that malware are likely to request more permissions than benign apps. Malware also request more dangerous permissions that can change the settings or use money?related services than benign apps. Yang Wang et al. also computed the risk levels for all Android permissions. Table 1 shows the top 20 permissions with highest risk levels [6].

2.2 Android Custom Permissions

Custom permissions are simply permissions declared by third?party applications. They are often used to protect different application components for services and content providers. For example, if Alice wants to share service between her own Android apps, the intent?filter in app A can be used for pending request, and then app B could use the intent to call the correspond service. However, in this case any apps can use app As service if they know the services action name in the intent?filter. Therefore, developers define their own custom permissions to protect their application components for data sharing. Any other apps cannot access a component unless the custom permission is requested and granted.

However, there are some security issues with custom permission. It might leak user data such as online browsing history, users in?app purchases and fake messages inserted via its app [7]. The vulnerability is talking about the custom permissions registered strategy. Custom permissions are always defined as “signature” protection?level in order to check whether the apps is signed with the same key or not, but it may be damaged by a malicious app which defines the same permission name with “normal” protection?level during “Race” [8]. If the malicious app is installed on an Android device before the benign app, the same permission name will be registered using a “first one wins” strategy. This scenario allows all third?party apps to access the component and the sharing data [9].

3 Literature Review

3.1 Privacy Impact Assessment

A PIA is a process for evaluating a proposal in terms of its impact upon privacy, which helps an agency identify the potential effects [10]. PIA enables an organisation to systematically and thoroughly analyse how a particular project or system will affect the privacy of the individuals involved [11]. PIA aims to minimise privacy risks. With it, we can identify and record risks at an early stage via analysing how the purposed uses of personal information and technology will work in practice.

3.2 Android Permission Framework

Android apps can only access their own files by default. In order to interact with the system and other applications, such apps request additional permissions that are granted at the installed time and cannot be changed [8].

Android provides a permission?based security model in the application framework. Developers must declare the permissions required using the tag in AndroidManifest.xml [12]. Android permissions are divided into four protection?levels, with different potential risks as discussed [13]:

1) Normal: A lower?risk permission that gives requesting applications access to isolated application?level features, with minimal risk to other applications, the system, or the user. The system automatically grants this type of permission to a requesting application at installation, without asking for the users explicit approval.

2) Dangerous: A higher?risk permission that gives a requesting application access to private user data or control over the device, which may cause negative impact on the user. Because this type of permission introduces potential risks, the system may not automatically grant it to the requesting application. A user must accept the installation of dangerous permissions at the install time.

3) Signature: A permission that the system grants only if the requesting application is signed with the same certificate as the application that declared the permission. If the certificates match, the system automatically grants the permission without notifying the user or asking for the users explicit approval.

4) SignatureOrSystem: A permission that the system grants only to applications that are in the Android system image or that are signed with the same certificate as the application that declared the permission.

3.3 Android Logger

Logging is an essential component of any Linux operating systems, including embedded ones. Either post?mortem or real?time analysis of a systems logs for errors or warnings is vital to isolate fatal errors [14]. Though Androids kernel still maintains its own Linux?based kernel?logging mechanism, it also uses another logging subsystem, colloquially referred to as the logger. This driver acts as the support for the logcat, dmesg, dumpsys, dumpstate and burgeport command. One program logcat displays a continuously updated list of system and application debug messages [15]. It provides four separate log buffers, depending on the type of information: main, radio, event and system [16]. Fig. 1 shows the flow of log event and components that assist the logger.

3.4 Android Intent

The primary method for inter?component communication, both within and between applications, is via intents [17]. It can be used with startActivity to launch an Activity, broadcastIntent to send it to any interested BroadcastReceiver components, and startService or bindService to communicate with a background Service [18].

3.5 Static and Dynamic Analysis

Static analysis works by disassembling and decompiling without actually running application. This does not affect the device. The methods for static analysis are quick, but they fail against the encrypted, polymorphic and code transformed malware [12]. Dynamic analysis methods execute an app in a protected environment, emulating all the resources and features. Therefore, they inspect its interaction for identifying malicious activities.

3.6 CIS Security Benchmark

The Security Benchmark [19] was proposed by the Center for Internet Security (CIS) and is a standard for security configuration of operating systems, including Linux, Windows, iOS and Android. This document defines the situation where operating system configuration settings should be in order for the system to be more secure. System administrators or users can set an Android operating system configuration based on this document in order to heighten the security of Android mobile devices.

4 System Architecture

A PIA system is designed for Android mobile devices, which supports the versions of Android above five. The PIA system can be installed on Android platforms because it is implemented into an Android application package (APK), and it does not need any additional condition such as network connection or USB teleport, which avoids other privacy risks. The system is composes of three parts as shown in Fig. 2. It performs with static method and dynamic methods at the same time.

4.1 Identifying Permission Requirements

The PIA system invokes the package manager to parse each apps permissions which should be declared in the AndroidManifest.xml file by developers (Fig. 3), and then calculates the privacy impact assessment score automatically referring to the protection?level [13] defined by Google and the report of the top 20 permissions with highest risk levels [6]. This main purpose of this method is to detect whether the app is using excessive permissions for dangerous requirements.

In general, the privacy impact assessment score of permissions for different categories are listed in Table 2. But, if the permission is in the top 20 with highest risk levels, the privacy impact score must be raised up to 10, because it can cause more huge damage to the system or the user and the app may have horrible potential motivation that declares the permission with highest risk levels. A custom permission defined by developers aims to share data or components with the developers applications, so its privacy impact score is 8. The custom permission still has some potential privacy risks discussed in section 2 even if it can generally protect other apps to access data

4.2 Analysing Configuration Settings

According to the configuration of the CIS Security Benchmark document [19] (Table 3), the PIA system verifies the items and configuration type by ContentResolver, device policy, cookie and Wi?Fi manager, in order to improve and repair configuration settings of the Android mobile device. If the system configuration does not pass the test, its privacy impact score is eight point, in contrast, its privacy impact score is zero point. The main purpose of this method is to suggest users what system configurations they should adjust and then actually enhance the security of the device with international safety standards.

4.3 Detecting Potential Activities

In order to mine characters related to the Android intent, the PIA system uses su and logcat command with grep command together in the Android shell, which aims to track the messages stored in the log buffer. This method can scan potential events or harmful activities when apps installed in the device are running. Fig. 4 shows the source code of the system that filters a specific keyword in the Android shell.

4.4 PIA Score Formula

The system finally computes the total privacy impact scores referring to Tables 2 and 3, according to the following formulae:

1) The Apps PIA score: The sum of all permission scores is divided by the quantity of permission.

2) The Android systems final PIA score: The sum of all App scores plus the sum of the configuration scores is divided by the quantity of App plus the quantity of the configuration item.

As a result, the user is able to get in?depth knowledge of the impact of privacy risks on each Android mobile device.

5 System Implementation

After installing an app on an Android mobile device, the user can begin to use it. When the app is executed, the screen in Fig. 5 will appear. At this time, the user must activate the device administrator for the system because the device policy manager will be used in the setting page in order to repair system configurations. Then the user can observe the Android systems privacy impact assessment result in the home page. When the user clicks the “detail” button, the page will show the detail information that including each apps score and system configuration score. If the user click “refresh” button, the system will calculator the PIA score again in the background thread by AsyncTask (Fig. 6).

The “permission” page displays all apps that have been installed in the mobile device shown (Fig. 7). If the user selects any apps in the list, he can enter the interface shown in Fig. 8 and read all permissions that the apps request, including normal, dangerous, signature, system and custom permissions. The user can also check the introduction about permissions protection?level information by click “introduce” button.

In the “intent” page, the user can click the “monitor” button to start scanning log messages from the log buffer by su, logcat and grep commands. The screen displays the record related to the Android intent or Apps activities. For example, when the Google drive uploads a photo from the users device, the “android.intent.action.SEND” log message will appear in the log buffer, and then the system shows “sending data” on the screen. However, if the user does not have super user privilege, which means he has not rooted his device, the screen will display “sorry” message as shown in Fig. 9.

In the “setting” page, the user sees the interface shown in Fig. 10. The items shown on the left column are the test items, while the middle column shows the test results. The “FIX” button shown on the right column appears when the device does not pass the test.

主站蜘蛛池模板: 九九热精品视频在线| 一区二区无码在线视频| 国产情侣一区二区三区| 国内精品久久久久久久久久影视| 国产99热| 巨熟乳波霸若妻中文观看免费| 在线观看亚洲精品福利片 | 亚洲最大福利视频网| 国产午夜精品鲁丝片| 日本成人福利视频| 亚洲性日韩精品一区二区| 国产在线麻豆波多野结衣| 伊人丁香五月天久久综合| 国产精品毛片一区视频播| 国产91久久久久久| 久久国产高清视频| 67194成是人免费无码| 在线观看欧美精品二区| 综合网天天| 亚洲aaa视频| 久久久久青草大香线综合精品 | 一本一道波多野结衣一区二区 | 激情亚洲天堂| 欧美精品亚洲精品日韩专区| 国产精品嫩草影院av| 97se亚洲综合| 欧美在线网| 试看120秒男女啪啪免费| 国内自拍久第一页| 女人18毛片一级毛片在线| 91在线高清视频| 在线观看热码亚洲av每日更新| 国产AV无码专区亚洲A∨毛片| 日韩欧美中文亚洲高清在线| 国产精品香蕉在线| 精品色综合| 无码免费视频| 青草午夜精品视频在线观看| 免费又爽又刺激高潮网址| 国产尤物视频在线| 国产成人久视频免费| 亚洲欧美色中文字幕| 99无码中文字幕视频| 国产人碰人摸人爱免费视频 | 2021国产v亚洲v天堂无码| 亚洲精品va| 亚洲无码A视频在线| 婷婷伊人久久| 国产乱子伦手机在线| 欧美日韩综合网| 免费在线播放毛片| 国产一区成人| 国产日本欧美在线观看| a免费毛片在线播放| 亚洲天堂区| 国产亚洲欧美在线中文bt天堂 | 亚洲人成网7777777国产| 亚洲欧洲自拍拍偷午夜色无码| 在线国产综合一区二区三区 | 免费又黄又爽又猛大片午夜| 欧美成人免费午夜全| 国产av色站网站| 日韩免费毛片| 91视频国产高清| 免费毛片全部不收费的| 成年人福利视频| 秘书高跟黑色丝袜国产91在线| 亚洲日本在线免费观看| 波多野结衣的av一区二区三区| 国产三级精品三级在线观看| 日韩不卡高清视频| 久久国产V一级毛多内射| 亚洲中文无码h在线观看| 日韩欧美国产三级| 国产v精品成人免费视频71pao | 精品夜恋影院亚洲欧洲| 国产综合亚洲欧洲区精品无码| 最近最新中文字幕在线第一页| 中字无码精油按摩中出视频| 久久成人国产精品免费软件| 999国内精品久久免费视频| 国产日韩欧美视频|