Feeds

Boffins tag Android app privacy fails

Your pocket is leaking data

5 things you didn’t know about cloud backup

A group of researchers from universities in Luxembourg, Germany and the US say they can dramatically improve the detection of privacy leaks between Android processes.

The researchers, led by Li Li of the University of Luxembourg, are looking for ways to identify apps that send private data outside the app's own domain without the user's consent (often by accident), via intra-component leaks, inter-component communications (ICC), and inter-application communication (IAC).

They claim that the tool they describe in this paper at Arxiv detected 88.3 per cent of inter-component privacy leaks, and when used in combination with ApkCombiner, also detected inter-application privacy leaks.

As noted in the paper, privacy leaks have been the subject of lots of academic research into Android, with Yajin Zhou a noted discoverer of different kinds of leaks, including this one reported last year.

The Android components that can contribute to leaks include calls like startActivity, startActivityForResult, query, startService and so on.

The Li Li paper outlines a technique called Static Taint Analysis, using a tool called IccTA that analyses inter-component and inter-app links. IccTA takes existing tools Epicc (from Pennsylvania State University, whose Damien Octeau and Patrick McDaniel contributed to the study) and FlowDroid (the German contribution, with Steven Arzt, Siegfried Rasthofer and Eric Bodden from EC SPRIDE), and extends them into the Android environment.

Their aim is to look both at how an app behaves both on its own, and how it interacts with other apps: “IccTA enables a data-flow analysis between two components and adequately models the lifecycle and callback methods to detect ICC based privacy leaks,” the researchers write.

“When running IccTA on three thousands applications randomly selected from the Google Play store as well other third-party markets, it detects 130 inter-component based privacy leaks in 12 applications.”

The good news, The Register notes, must be that only a dozen apps out of the 3,000 tested actually revealed privacy leaks.

Li Li's colleagues at the University of Luxembourg, Alexandre Bartel, Jacques Klein, Yves Le Traon, also took part in the project. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
JLaw, Kate Upton EXPOSED in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.