A study on static analysis model of mobile application for privacy protection

Seil Kim, Jae Ik Cho, Hee Won Myeong, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user's private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through 'Privacy Act' as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user's personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.

Original languageEnglish
Title of host publicationComputer Science and Convergence, CSA 2011 and WCC 2011 Proceedings
Pages529-540
Number of pages12
DOIs
Publication statusPublished - 2012
Event3rd International Conference on Computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011 - Jeju, Korea, Republic of
Duration: 2011 Dec 122011 Dec 15

Publication series

NameLecture Notes in Electrical Engineering
Volume114 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other3rd International Conference on Computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011
CountryKorea, Republic of
CityJeju
Period11/12/1211/12/15

Keywords

  • Android
  • Privacy
  • Signature
  • Static analysis

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint Dive into the research topics of 'A study on static analysis model of mobile application for privacy protection'. Together they form a unique fingerprint.

  • Cite this

    Kim, S., Cho, J. I., Myeong, H. W., & Lee, D. H. (2012). A study on static analysis model of mobile application for privacy protection. In Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings (pp. 529-540). (Lecture Notes in Electrical Engineering; Vol. 114 LNEE). https://doi.org/10.1007/978-94-007-2792-2_50