{"title":"Investigating and Revealing Privacy Leaks in Mobile Application Traffic","authors":"Shuhui Chen, Shuang Zhao, Biao Han, Xiaoyan Wang","doi":"10.1109/WD.2019.8734246","DOIUrl":null,"url":null,"abstract":"Mobile devices and applications are playing an important role in people’s daily activities. Although mobile application greatly enriches and facilitates the lives of its users, the users are unconsciously giving away their privacy. In this paper, a mobile traffic analysis tool is proposed to find out what private data is leaked from application network traffic. The analysis process has two steps, including capturing network traffic and analyzing privacy leakage. By applying this tool on traffic from 51 popular applications in China, we show that a lot of private information can be obtained by passively monitoring network traffic, such as location, device information, online behavior, and even personal password. Finally, the measures for mitigating the leakage of private user data are discussed.","PeriodicalId":432101,"journal":{"name":"2019 Wireless Days (WD)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Wireless Days (WD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WD.2019.8734246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Mobile devices and applications are playing an important role in people’s daily activities. Although mobile application greatly enriches and facilitates the lives of its users, the users are unconsciously giving away their privacy. In this paper, a mobile traffic analysis tool is proposed to find out what private data is leaked from application network traffic. The analysis process has two steps, including capturing network traffic and analyzing privacy leakage. By applying this tool on traffic from 51 popular applications in China, we show that a lot of private information can be obtained by passively monitoring network traffic, such as location, device information, online behavior, and even personal password. Finally, the measures for mitigating the leakage of private user data are discussed.