CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Computed Summaries of Android Bluetooth Library: Data Leakages Detection

by Kevin A. Nyakundi, Elisha Abade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 7
Year of Publication: 2016
Authors: Kevin A. Nyakundi, Elisha Abade
10.5120/ijca2016912327

Kevin A. Nyakundi, Elisha Abade . Computed Summaries of Android Bluetooth Library: Data Leakages Detection. International Journal of Computer Applications. 155, 7 ( Dec 2016), 35-39. DOI=10.5120/ijca2016912327

@article{ 10.5120/ijca2016912327,
author = { Kevin A. Nyakundi, Elisha Abade },
title = { Computed Summaries of Android Bluetooth Library: Data Leakages Detection },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 7 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number7/26619-2016912327/ },
doi = { 10.5120/ijca2016912327 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:40.186008+05:30
%A Kevin A. Nyakundi
%A Elisha Abade
%T Computed Summaries of Android Bluetooth Library: Data Leakages Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 7
%P 35-39
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Static analysis has been used for assessing android applications for possible data leaks both known and unknown. Due to large size of applications and the libraries that they depend on, it’s expensive to perform whole program analysis which leads to either ignoring or making assumptions of the effect of the library that puts into question the soundness of the results. Missed paths are generated that lead to false alarms and missed paths that in return allow possible leaks evade detection. The study computed Android Bluetooth Library 2.1 summaries that were successful used to analyze twenty target applications and no possible data leak was detected. Exploratory approach was used to answer the research questions and lastly java-call graph suite of programs was used to construct a call graph of the library and Dexter android static tool for applications.

References
  1. .Ali, K. and Lhoták, O., 2013, July. Averroes: Whole-program analysis without the whole program. In European Conference on Object-Oriented Programming (pp. 378-400). Springer Berlin Heidelberg.
  2. .Ali, K. and Lhoták, O., 2012, June. Application-only call graph construction. In European Conference on Object-Oriented Programming (pp. 688-712). Springer Berlin Heidelberg.
  3. .Yan, D., Xu, G. and Rountev, A., 2012, June. Rethinking soot for summary-based whole-program analysis. In Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis (pp. 9-14). ACM.
  4. .Ali, K., 2014. The Separate Compilation Assumption (Doctoral dissertation, University of Waterloo).
  5. [5.]Allen, N., Krishnan, P. and Scholz, B., 2015, June. Combining type-analysis with points-to analysis for analyzing Java library source-code. InProceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis (pp. 13-18). ACM.
  6. .Smaragdakis, Y., Balatsouras, G., Kastrinis, G. and Bravenboer, M., 2015, November. More sound static handling of Java reflection. In Asian Symposium on Programming Languages and Systems (pp. 485-503). Springer International Publishing.
  7. .Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N. and Rinard, M.C., 2015. Information Flow Analysis of Android Applications in DroidSafe. In NDSS.
  8. .Gibler, C., Crussell, J., Erickson, J. and Chen, H., 2012, June. AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In International Conference on Trust and Trustworthy Computing (pp. 291-307). Springer Berlin Heidelberg.
  9. .Payet, É. and Spoto, F., 2012. Static analysis of Android programs.Information and Software Technology, 54(11), pp.1192-1201.
  10. .Gibler, C., Crussell, J., Erickson, J. and Chen, H., 2012, June. AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In International Conference on Trust and Trustworthy Computing (pp. 291-307). Springer Berlin Heidelberg.
  11. .Parvez, MAD&J 2013, 'Evaluating Smartphone Application Security: A Case Study on Android', Global Journal of Computer Science and Technology Network, Web & Security, vol 13, no. 12, pp. 9-15.
  12. .Luigi Vigneriy, JCIPAOH 27th april 2015, 'Taming the Android AppStore: Lightweight Characterization of Android Applications', Research Report RR-15-305, Networking and Security department , EURECOM, Campus SophiaTech, 1504.06093v2, EURECOM, Sophia Antipolis cedex,France
  13. .Gascon, H., Yamaguchi, F., Arp, D. and Rieck, K., 2013, November. Structural detection of android malware using embedded call graphs. InProceedings of the 2013 ACM workshop on Artificial intelligence and security(pp. 45-54). ACM.
  14. .Shen, T., Zhongyang, Y., Xin, Z., Mao, B. and Huang, H., 2014, September. Detect android malware variants using component based topology graph. In2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 406-413). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Static Analysis data leakages Android Libraries