A study on static analysis model of mobile application for privacy protection

Seil Kim, Jae Ik Cho, Hee Won Myeong, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user's private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through 'Privacy Act' as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user's personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.

Original languageEnglish
Title of host publicationLecture Notes in Electrical Engineering
Pages529-540
Number of pages12
Volume114 LNEE
DOIs
Publication statusPublished - 2012 Jan 1
Event3rd International Conference on Computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011 - Jeju, Korea, Republic of
Duration: 2011 Dec 122011 Dec 15

Publication series

NameLecture Notes in Electrical Engineering
Volume114 LNEE
ISSN (Print)18761100
ISSN (Electronic)18761119

Other

Other3rd International Conference on Computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011
CountryKorea, Republic of
CityJeju
Period11/12/1211/12/15

Fingerprint

Static analysis

Keywords

  • Android
  • Privacy
  • Signature
  • Static analysis

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Cite this

Kim, S., Cho, J. I., Myeong, H. W., & Lee, D. H. (2012). A study on static analysis model of mobile application for privacy protection. In Lecture Notes in Electrical Engineering (Vol. 114 LNEE, pp. 529-540). (Lecture Notes in Electrical Engineering; Vol. 114 LNEE). https://doi.org/10.1007/978-94-007-2792-2_50

A study on static analysis model of mobile application for privacy protection. / Kim, Seil; Cho, Jae Ik; Myeong, Hee Won; Lee, Dong Hoon.

Lecture Notes in Electrical Engineering. Vol. 114 LNEE 2012. p. 529-540 (Lecture Notes in Electrical Engineering; Vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S, Cho, JI, Myeong, HW & Lee, DH 2012, A study on static analysis model of mobile application for privacy protection. in Lecture Notes in Electrical Engineering. vol. 114 LNEE, Lecture Notes in Electrical Engineering, vol. 114 LNEE, pp. 529-540, 3rd International Conference on Computer Science and Its Applications, CSA 2011 and 2011 FTRA World Convergence Conference, WCC 2011, Jeju, Korea, Republic of, 11/12/12. https://doi.org/10.1007/978-94-007-2792-2_50
Kim S, Cho JI, Myeong HW, Lee DH. A study on static analysis model of mobile application for privacy protection. In Lecture Notes in Electrical Engineering. Vol. 114 LNEE. 2012. p. 529-540. (Lecture Notes in Electrical Engineering). https://doi.org/10.1007/978-94-007-2792-2_50
Kim, Seil ; Cho, Jae Ik ; Myeong, Hee Won ; Lee, Dong Hoon. / A study on static analysis model of mobile application for privacy protection. Lecture Notes in Electrical Engineering. Vol. 114 LNEE 2012. pp. 529-540 (Lecture Notes in Electrical Engineering).
@inproceedings{3a9154229f1746069bb9f84da9582275,
title = "A study on static analysis model of mobile application for privacy protection",
abstract = "Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user's private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through 'Privacy Act' as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user's personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.",
keywords = "Android, Privacy, Signature, Static analysis",
author = "Seil Kim and Cho, {Jae Ik} and Myeong, {Hee Won} and Lee, {Dong Hoon}",
year = "2012",
month = "1",
day = "1",
doi = "10.1007/978-94-007-2792-2_50",
language = "English",
isbn = "9789400727915",
volume = "114 LNEE",
series = "Lecture Notes in Electrical Engineering",
pages = "529--540",
booktitle = "Lecture Notes in Electrical Engineering",

}

TY - GEN

T1 - A study on static analysis model of mobile application for privacy protection

AU - Kim, Seil

AU - Cho, Jae Ik

AU - Myeong, Hee Won

AU - Lee, Dong Hoon

PY - 2012/1/1

Y1 - 2012/1/1

N2 - Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user's private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through 'Privacy Act' as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user's personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.

AB - Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user's private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through 'Privacy Act' as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user's personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.

KW - Android

KW - Privacy

KW - Signature

KW - Static analysis

UR - http://www.scopus.com/inward/record.url?scp=84255178215&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84255178215&partnerID=8YFLogxK

U2 - 10.1007/978-94-007-2792-2_50

DO - 10.1007/978-94-007-2792-2_50

M3 - Conference contribution

AN - SCOPUS:84255178215

SN - 9789400727915

VL - 114 LNEE

T3 - Lecture Notes in Electrical Engineering

SP - 529

EP - 540

BT - Lecture Notes in Electrical Engineering

ER -