SlideShare a Scribd company logo
1 of 3
An App to Log Location Mining
Apps in Android Appliances
By
Nazir Ahmad Dar1 [nazir.cuk@gmail.com]
Afaq Alam Khan2
1ApTech (ILM Infinity), Parraypora Srinagar
2Department of IT, Central University of Kashmir
Venue:
Department of Electronics
and Instrumentation
Technology,
University of Kashmir,
Srinagar, Kashmir, J&K,
India, 190006
UGC Sponsored National Seminar on
Electronic Devices, Systems and Information Security
18-19 March 2016
nazir.cuk@gmail.com
ISBN(Print) 978-93-82288-6 ; page –
Copyright and peer review of this paper research Lies with University of
Kashmir, Srinagar
https://www.academia.edu/23521533/An_App_to_Log_Location_Mining_Apps_in_
Android_Appliances
Android is undoubtedly the most widely used operating system for mobile phones and
tablets. Its market share is high as compared to other mobile operating systems even
higher than iOS. Such a huge base of users makes Android an ideal target for malwares.
There has been a rapid increase in the number of malware attacks. Even though
malware detection is one of the major concerns in mobile computing but data mining
intrusive apps are emerging as a major challenge nowadays. Such apps can be more
dangerous to users than malwares. Mobile phones do store sensitive data and leakage of
this information can be risky. Geo-located data is valuable and snooping on geo-location
is one of the primary tasks of malicious apps. Android provides a passive security
mechanism to publish apps on play-store. Therefore, it is not proving to be much
effective in case of data leakage. This paper proposes an app which constructs logs of
apps which mine location of a device. The app inspects on Manifest files, Intents, app
description and the network traffic statistics of an app. This lets the users know which
app is mining its location. Hence, a user can check the maliciousness of an app.
Besides, a learning algorithm can be applied to the logs generated for the malware
detection purpose.
 Apps needlessly mining personal data of the user on the
device. One in four apps doing this.
 Data often sold to third party marketers.
 Data leakage may pose some risks both social as well as
professional.
 Geo-Located data most valuable for advertisers.
 Most intrusive apps mining geo-located data.
 74% of smartphone users use LBS
NazirAhmadDarSEEDS–2016
An App to Log Location Mining Apps in Android SEEDS-2016

More Related Content

What's hot

Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
skowshik
 
Mobile security
Mobile securityMobile security
Mobile security
home
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
SytelReplyUK
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
Isnur Rochmad
 

What's hot (20)

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile security
Mobile securityMobile security
Mobile security
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
20120140504023
2012014050402320120140504023
20120140504023
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
Build the future of mobile apps with facebook mobile app europe berlin sept 14
Build the future of mobile apps with facebook   mobile app europe berlin sept 14Build the future of mobile apps with facebook   mobile app europe berlin sept 14
Build the future of mobile apps with facebook mobile app europe berlin sept 14
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
ANDROID PROJECTS 2014
ANDROID PROJECTS 2014ANDROID PROJECTS 2014
ANDROID PROJECTS 2014
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 

Viewers also liked

4656 4660.output
4656 4660.output4656 4660.output
4656 4660.output
j1075017
 
4726 4730.output
4726 4730.output4726 4730.output
4726 4730.output
j1075017
 
4261 4265.output
4261 4265.output4261 4265.output
4261 4265.output
j1075017
 
Roles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century educationRoles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century education
majajoysevilla
 
5206 5210.output
5206 5210.output5206 5210.output
5206 5210.output
j1075017
 
4421 4425.output
4421 4425.output4421 4425.output
4421 4425.output
j1075017
 
4636 4640.output
4636 4640.output4636 4640.output
4636 4640.output
j1075017
 
4906 4910.output
4906 4910.output4906 4910.output
4906 4910.output
j1075017
 
Ikea Brand Audit
Ikea Brand AuditIkea Brand Audit
Ikea Brand Audit
John Fell
 

Viewers also liked (17)

4656 4660.output
4656 4660.output4656 4660.output
4656 4660.output
 
4726 4730.output
4726 4730.output4726 4730.output
4726 4730.output
 
4261 4265.output
4261 4265.output4261 4265.output
4261 4265.output
 
Roles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century educationRoles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century education
 
20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_es20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_es
 
5206 5210.output
5206 5210.output5206 5210.output
5206 5210.output
 
No Title
No TitleNo Title
No Title
 
4421 4425.output
4421 4425.output4421 4425.output
4421 4425.output
 
4636 4640.output
4636 4640.output4636 4640.output
4636 4640.output
 
Shared_Value_Mark_Kramer
Shared_Value_Mark_KramerShared_Value_Mark_Kramer
Shared_Value_Mark_Kramer
 
Sociedad de consumo
Sociedad de consumoSociedad de consumo
Sociedad de consumo
 
Balanced Translocation
Balanced TranslocationBalanced Translocation
Balanced Translocation
 
Πιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy DeviceΠιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy Device
 
4906 4910.output
4906 4910.output4906 4910.output
4906 4910.output
 
Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)
 
EJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOSEJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOS
 
Ikea Brand Audit
Ikea Brand AuditIkea Brand Audit
Ikea Brand Audit
 

Similar to Ppt crc nazir_seeds

ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
FACE
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
BRNSSPublicationHubI
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
IAEME Publication
 

Similar to Ppt crc nazir_seeds (20)

Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Ppt crc nazir_seeds

  • 1. An App to Log Location Mining Apps in Android Appliances By Nazir Ahmad Dar1 [nazir.cuk@gmail.com] Afaq Alam Khan2 1ApTech (ILM Infinity), Parraypora Srinagar 2Department of IT, Central University of Kashmir Venue: Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, Kashmir, J&K, India, 190006 UGC Sponsored National Seminar on Electronic Devices, Systems and Information Security 18-19 March 2016 nazir.cuk@gmail.com ISBN(Print) 978-93-82288-6 ; page – Copyright and peer review of this paper research Lies with University of Kashmir, Srinagar https://www.academia.edu/23521533/An_App_to_Log_Location_Mining_Apps_in_ Android_Appliances
  • 2. Android is undoubtedly the most widely used operating system for mobile phones and tablets. Its market share is high as compared to other mobile operating systems even higher than iOS. Such a huge base of users makes Android an ideal target for malwares. There has been a rapid increase in the number of malware attacks. Even though malware detection is one of the major concerns in mobile computing but data mining intrusive apps are emerging as a major challenge nowadays. Such apps can be more dangerous to users than malwares. Mobile phones do store sensitive data and leakage of this information can be risky. Geo-located data is valuable and snooping on geo-location is one of the primary tasks of malicious apps. Android provides a passive security mechanism to publish apps on play-store. Therefore, it is not proving to be much effective in case of data leakage. This paper proposes an app which constructs logs of apps which mine location of a device. The app inspects on Manifest files, Intents, app description and the network traffic statistics of an app. This lets the users know which app is mining its location. Hence, a user can check the maliciousness of an app. Besides, a learning algorithm can be applied to the logs generated for the malware detection purpose.
  • 3.  Apps needlessly mining personal data of the user on the device. One in four apps doing this.  Data often sold to third party marketers.  Data leakage may pose some risks both social as well as professional.  Geo-Located data most valuable for advertisers.  Most intrusive apps mining geo-located data.  74% of smartphone users use LBS NazirAhmadDarSEEDS–2016 An App to Log Location Mining Apps in Android SEEDS-2016