[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Study on Static Analysis Model of Mobile Application for Privacy Protection

  • Conference paper
  • First Online:
Computer Science and Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 114))

Abstract

Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user’s private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through ‘Privacy Act’ as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user’s personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim GH (2011) Korea communication commission annual report, EKCC

    Google Scholar 

  2. Seo SH (2010) Smartphone security threats and response strategies. TTA J 132:44–48

    Google Scholar 

  3. Nachenberg C (2011) A window into mobile device security, Symantec

    Google Scholar 

  4. McAfee Labs (2011) McAfee threats report: fourth quarter 2010, McAfee

    Google Scholar 

  5. Kim HS (2010) Monthly report of Ahnlab, AhnLab

    Google Scholar 

  6. Kim IS (2010) Analysis method and response guide of mobile malwares, KICS 35(4)

    Google Scholar 

  7. Kim YM (2010) A study on development of smartphone based malicious code collection and analysis platform, KISA

    Google Scholar 

  8. Ryou JC (2010) Study of malware detection based mobile OS, KISA

    Google Scholar 

  9. Lim SJ (2010) A study on protection model of propagation through smartphone malware analysis. KIAS 10(1):1–8

    Google Scholar 

  10. Reinbacher T, Horauer M, Schlich B, Brauer Jorg, Scheuer F (2011) Model checking embedded software of an industrial knitting machine. IJITCC 1(2):186–205

    Article  Google Scholar 

  11. Li T, Yu F, Lin Y, Kong X, Yu Y (2011) Trusted computing dynamic attestation using a static analysis based behaviour model. JoC 2(1):61–68

    Google Scholar 

  12. Liang W-Y, Lai P-T, Chiou CW (2011) An energy conservation DVFS algorithm for the Android operating system. JoC 1(1):93–100

    Google Scholar 

  13. Xie B, Kumar A, Zhao D, Reddy R, He B (2011) On secure communication in integrated heterogeneous wireless networks. IJITCC 1(1):4–23

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the IT R&D program of MKE/KEIT [KI0038421, Develop method and apparatus for diagnosing malicious mobile program and protecting solution].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Hoon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Kim, S., Cho, J.I., Myeong, H.W., Lee, D.H. (2012). A Study on Static Analysis Model of Mobile Application for Privacy Protection. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_50

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2792-2_50

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2791-5

  • Online ISBN: 978-94-007-2792-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics