{"title":"调查和揭示移动应用程序流量中的隐私泄露","authors":"Shuhui Chen, Shuang Zhao, Biao Han, Xiaoyan Wang","doi":"10.1109/WD.2019.8734246","DOIUrl":null,"url":null,"abstract":"Mobile devices and applications are playing an important role in people’s daily activities. Although mobile application greatly enriches and facilitates the lives of its users, the users are unconsciously giving away their privacy. In this paper, a mobile traffic analysis tool is proposed to find out what private data is leaked from application network traffic. The analysis process has two steps, including capturing network traffic and analyzing privacy leakage. By applying this tool on traffic from 51 popular applications in China, we show that a lot of private information can be obtained by passively monitoring network traffic, such as location, device information, online behavior, and even personal password. Finally, the measures for mitigating the leakage of private user data are discussed.","PeriodicalId":432101,"journal":{"name":"2019 Wireless Days (WD)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Investigating and Revealing Privacy Leaks in Mobile Application Traffic\",\"authors\":\"Shuhui Chen, Shuang Zhao, Biao Han, Xiaoyan Wang\",\"doi\":\"10.1109/WD.2019.8734246\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile devices and applications are playing an important role in people’s daily activities. Although mobile application greatly enriches and facilitates the lives of its users, the users are unconsciously giving away their privacy. In this paper, a mobile traffic analysis tool is proposed to find out what private data is leaked from application network traffic. The analysis process has two steps, including capturing network traffic and analyzing privacy leakage. By applying this tool on traffic from 51 popular applications in China, we show that a lot of private information can be obtained by passively monitoring network traffic, such as location, device information, online behavior, and even personal password. Finally, the measures for mitigating the leakage of private user data are discussed.\",\"PeriodicalId\":432101,\"journal\":{\"name\":\"2019 Wireless Days (WD)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Wireless Days (WD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WD.2019.8734246\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Wireless Days (WD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WD.2019.8734246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigating and Revealing Privacy Leaks in Mobile Application Traffic
Mobile devices and applications are playing an important role in people’s daily activities. Although mobile application greatly enriches and facilitates the lives of its users, the users are unconsciously giving away their privacy. In this paper, a mobile traffic analysis tool is proposed to find out what private data is leaked from application network traffic. The analysis process has two steps, including capturing network traffic and analyzing privacy leakage. By applying this tool on traffic from 51 popular applications in China, we show that a lot of private information can be obtained by passively monitoring network traffic, such as location, device information, online behavior, and even personal password. Finally, the measures for mitigating the leakage of private user data are discussed.