IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control

A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
View Sample PDF
Author(s): Fan Wu (Beijing University of Posts and Telecommunications, Beijing, China), Ran Sun (Beijing University of Posts and Telecommunications, Beijing, China), Wenhao Fan (Beijing University of Posts and Telecommunications, Beijing, China), Yuan'An Liu (Beijing University of Posts and Telecommunications, Beijing, China), Feng Liu (State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China)and Hui Lu (Guangzhou University, Guangzhou, China)
Copyright: 2020
Pages: 20
Source title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-2466-4.ch022

Purchase

View A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control on the publisher's website for pricing and purchasing information.

Abstract

This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior of applications without modifying the Android framework and the application's source code. Based on this method, a privacy data protection policy that reflects users' intentions is proposed by extracting and recording the privacy data usage in applications. Moreover, an optimized random forest algorithm is proposed to reduce the policy training time. The result shows that the system realizes the functions of application runtime behavior monitor and control. An experiment on 134 widely used applications shows that the basic privacy policy could satisfy the majority of users' privacy intentions.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom