System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
KAUDroid: A tool that will spy on applications and how they spy on their users
Karlstad University.
Karlstad University.
Karlstad University.
Karlstad University.
2018 (English)Report (Other academic)
Abstract [en]

Our mobile phone is today our most precious and condential partof us. In many cases we do not only share phone number with it, butalso our most private information. This information is to some extensionnaively shared and gathered without our knowledge. As the number ofadvanced and sophisticated services increase the more sensitive informa-tion we seem to throw at them. To prevent privacy intrusions Googles'soperation system Android uses something called permissions. Permis-sions are a decision to allow an Android application access to a resourceon a specic device. Once a permission is granted there is no possibil-ity for a user to verify that the application does not take advantage ofthe given trust. With granted permissions applications can collect a vastamount of information without any connection to the service it provides.To highlight this problem we present the KAUDroid platform, a two part,Android application surveillance system. KAUDroid consists of an An-droid application that collect permission usage on phones and a centralserver responsible for data storage. Information is presented to the publicthrough a web user interface using graphs to visualize data in a under-standable manner. With this tool we hope to raise the general awareness ofhow third-party applications tend to abuse their trust and to help peoplerecapture their unconsciously lost privacy.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2018. , p. 56
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-66090ISBN: 978-91-7063-928-9 (electronic)OAI: oai:DiVA.org:kau-66090DiVA, id: diva2:1179950
Note

Working paper, Januari 2018

Available from: 2018-02-02 Created: 2018-02-02 Last updated: 2018-02-02Bibliographically approved

Open Access in DiVA

fulltext(1663 kB)377 downloads
File information
File name FULLTEXT01.pdfFile size 1663 kBChecksum SHA-512
b34c8b1502daec7228faf19a8f1410ddf3d9899421aa49848922196968a539940bb52c3dce74edea0a38a01b421184557862f542566028fe053f43b5da391202
Type fulltextMimetype application/pdf

By organisation
Karlstad University
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 377 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1439 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf