H. Atapattu, W. Fernando, J. P. A. K. Somasiri, P. M. K. Lokuge, A. Senarathne, Muditha Tissera
{"title":"Android系统敏感数据泄露检测及隐私策略分析应用(PriVot)","authors":"H. Atapattu, W. Fernando, J. P. A. K. Somasiri, P. M. K. Lokuge, A. Senarathne, Muditha Tissera","doi":"10.1109/ICAC54203.2021.9671075","DOIUrl":null,"url":null,"abstract":"Mobile applications can have access to various sensitive information to accomplish the business requirements as well as user requirements. Due to the sensitivity of this information, app developers are bound by the regulations to provide a privacy policy that describes their data collection practices. However, there were many incidents where the privacy policies were inconsistent with the actual data practices. Additionally, the privacy policies are often too long and difficult to grasp just by reading them due to their complex language. To address this hurdle, we propose a mobile application “PriVot”. PriVot has a privacy policy analyzer built with a hierarchical classifier using convolutional neural networks to provide a detailed and unambiguous summary indicating the data that is being collected by each app and their purpose for being collected Furthermore, it monitors the network traffic of the device with the aid of a Transport Layer Security(TLS) proxy, a Forwarder, and a Traffic Analyzer that operates on-device without requiring root privileges to identify potential data leakages and privacy policy violations. We present “PriVot” which achieved a 67.4% accuracy on privacy policy analysis and a 72.5% throughput at a low latency overhead with the network traffic monitoring.","PeriodicalId":227059,"journal":{"name":"2021 3rd International Conference on Advancements in Computing (ICAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Sensitive Data Leakage Detection and Privacy Policy Analyzing Application for Android Systems (PriVot)\",\"authors\":\"H. Atapattu, W. Fernando, J. P. A. K. Somasiri, P. M. K. Lokuge, A. Senarathne, Muditha Tissera\",\"doi\":\"10.1109/ICAC54203.2021.9671075\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile applications can have access to various sensitive information to accomplish the business requirements as well as user requirements. Due to the sensitivity of this information, app developers are bound by the regulations to provide a privacy policy that describes their data collection practices. However, there were many incidents where the privacy policies were inconsistent with the actual data practices. Additionally, the privacy policies are often too long and difficult to grasp just by reading them due to their complex language. To address this hurdle, we propose a mobile application “PriVot”. PriVot has a privacy policy analyzer built with a hierarchical classifier using convolutional neural networks to provide a detailed and unambiguous summary indicating the data that is being collected by each app and their purpose for being collected Furthermore, it monitors the network traffic of the device with the aid of a Transport Layer Security(TLS) proxy, a Forwarder, and a Traffic Analyzer that operates on-device without requiring root privileges to identify potential data leakages and privacy policy violations. We present “PriVot” which achieved a 67.4% accuracy on privacy policy analysis and a 72.5% throughput at a low latency overhead with the network traffic monitoring.\",\"PeriodicalId\":227059,\"journal\":{\"name\":\"2021 3rd International Conference on Advancements in Computing (ICAC)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 3rd International Conference on Advancements in Computing (ICAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAC54203.2021.9671075\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 3rd International Conference on Advancements in Computing (ICAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAC54203.2021.9671075","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Sensitive Data Leakage Detection and Privacy Policy Analyzing Application for Android Systems (PriVot)
Mobile applications can have access to various sensitive information to accomplish the business requirements as well as user requirements. Due to the sensitivity of this information, app developers are bound by the regulations to provide a privacy policy that describes their data collection practices. However, there were many incidents where the privacy policies were inconsistent with the actual data practices. Additionally, the privacy policies are often too long and difficult to grasp just by reading them due to their complex language. To address this hurdle, we propose a mobile application “PriVot”. PriVot has a privacy policy analyzer built with a hierarchical classifier using convolutional neural networks to provide a detailed and unambiguous summary indicating the data that is being collected by each app and their purpose for being collected Furthermore, it monitors the network traffic of the device with the aid of a Transport Layer Security(TLS) proxy, a Forwarder, and a Traffic Analyzer that operates on-device without requiring root privileges to identify potential data leakages and privacy policy violations. We present “PriVot” which achieved a 67.4% accuracy on privacy policy analysis and a 72.5% throughput at a low latency overhead with the network traffic monitoring.