Open Access System for Information Sharing

Login Library

 

Article
Cited 3 time in webofscience Cited 3 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
DC FieldValueLanguage
dc.contributor.authorCHO, BEUMJIN-
dc.contributor.authorLEE, SANGHO-
dc.contributor.authorXU, MENG-
dc.contributor.authorJI, SANGWOO-
dc.contributor.authorKIM, TAESOO-
dc.contributor.authorKIM, JONG-
dc.date.accessioned2018-05-03T09:36:18Z-
dc.date.available2018-05-03T09:36:18Z-
dc.date.created2018-02-21-
dc.date.issued2018-01-
dc.identifier.issn1820-0214-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/41010-
dc.description.abstractUpdating applications is an important mechanism to enhance their availability, functionality, and security. However, without careful considerations, application updates can bring other security problems. In this paper, we consider a novel attack that exploits application updates on Android: a cross-update privacy-leak attack called COUPLE. The COUPLE attack allows an application to secretly leak sensitive data through the cross-update interaction between its old and new versions; each version only has permissions and logic for either data collection or transmission to evade detection. We implement a runtime security system, BREAKUP, that prevents cross-update sensitive data transactions by tracking permission-use histories of individual applications. Evaluation results show that BREAKUP’s time overhead is below 5%. We further show the feasibility of the COUPLE attack by analyzing the versions of 2,009 applications (28,682 APKs). © 2018, ComSIS Consortium. All rights reserved.-
dc.languageEnglish-
dc.publisherComSIS Consortium-
dc.relation.isPartOfComputer Science and Information Systems-
dc.titlePrevention of Cross-update Privacy Leaks on Android-
dc.typeArticle-
dc.identifier.doi10.2298/CSIS170728047C-
dc.type.rimsART-
dc.identifier.bibliographicCitationComputer Science and Information Systems, v.15, no.1, pp.111 - 137-
dc.identifier.wosid000427010600006-
dc.citation.endPage137-
dc.citation.number1-
dc.citation.startPage111-
dc.citation.titleComputer Science and Information Systems-
dc.citation.volume15-
dc.contributor.affiliatedAuthorCHO, BEUMJIN-
dc.contributor.affiliatedAuthorJI, SANGWOO-
dc.contributor.affiliatedAuthorKIM, JONG-
dc.identifier.scopusid2-s2.0-85041620387-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.type.docTypeARTICLE-
dc.subject.keywordAuthorAndroid-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorInformation flow-
dc.subject.keywordAuthorPermission-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse