A Privacy Stealing Detection Method Based on Behavior-Chain for Android Applications

Zhao-guo WANG,Cheng-long LI,Luo-shi ZHANG,Ji-bao ZHANG,Yi GUAN,Yi-bo XUE
DOI: https://doi.org/10.3969/j.issn.0372-2112.2015.09.011
2015-01-01
Abstract:The increasing presence of Android privacy leakages poses a significant privacy risk for Android smartphone users.This paper proposes a privacy leakage detection method based on behavior chain,which can achieve the fine-grained location of the source and points of the information leakage.With the WxShall algorithm,we can calculate the accessibility between the leak-age source and leakage points,and detect the transfer path of privacy in Android applications.The detections of 1259 Android appli-cations show that the accuracy of this algorithm reaches 95.1% and the complexity accounts for 5.45% of WarShall algorithm.The results of the experiments demonstrate that the method is better than Androgurad and Kirin.
What problem does this paper attempt to address?