dc.contributor.author | Dimitriadis, Antonios | |
dc.contributor.author | Drosatos, George | |
dc.contributor.author | Efraimidis, Pavlos S. | |
dc.date.accessioned | 2021-03-26T13:21:00Z | |
dc.date.available | 2021-03-26T13:21:00Z | |
dc.date.issued | 2019-11 | |
dc.identifier.uri | http://hdl.handle.net/11728/11790 | |
dc.description.abstract | Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by requesting the appropriate permissions from the user. However, in Android, the access to certain assets is granted by default to the installed apps. For example, any Android app has the right to get the device's network operator, which may be used to infer information about user's country and nationality. Similarly, any app has access to the clipboard which may occasionally contain very sensitive information, like a password. Consequently, a honest but curious Android app may leverage the implicit access rights to accumulate such unguarded information pieces and gradually build a detailed profile of the user. The device owner has no immediate way to control this flow of information and, even worse, may not even be aware that this type personal data flow can take place. In this work, we examine the issue of default access rights of Android apps and discuss the potential threat against user privacy. We assess the user awareness and present a prototype zero-permission app that collects user data. | en_UK |
dc.language.iso | en | en_UK |
dc.relation.ispartofseries | CECC 2019: Proceedings of the Third Central European Cybersecurity Conference;vol. 7 | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_UK |
dc.subject | Android security | en_UK |
dc.subject | Profiling, Data ex-filtration | en_UK |
dc.subject | Privacy leakage | en_UK |
dc.title | How much does a zero-permission Android app know about us? | en_UK |
dc.type | Article | en_UK |
dc.doi | doi.org/10.1145/3360664.3360671 | en_UK |