2018
DOI: 10.1016/j.jisa.2018.07.005
|View full text |Cite
|
Sign up to set email alerts
|

iABC: Towards a hybrid framework for analyzing and classifying behaviour of iOS applications using static and dynamic analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Our previous works on dynamic analysis of run-time behavior of some iOS apps have revealed startling facts about how user's data is shared over the network [6,25]. In this work, we extend and enhance our previous work on dynamic analysis [6,24] and propose privacy preserving approach to decrease privacy disclosure score of an individual user. To determine the data types of the attributes that are shared over the network, an exhaustive dynamic analysis was performed for different permissions to list all types of data being shared after user grants permissions to the application.…”
Section: Ishield: Privacy Score Modelmentioning
confidence: 93%
See 4 more Smart Citations
“…Our previous works on dynamic analysis of run-time behavior of some iOS apps have revealed startling facts about how user's data is shared over the network [6,25]. In this work, we extend and enhance our previous work on dynamic analysis [6,24] and propose privacy preserving approach to decrease privacy disclosure score of an individual user. To determine the data types of the attributes that are shared over the network, an exhaustive dynamic analysis was performed for different permissions to list all types of data being shared after user grants permissions to the application.…”
Section: Ishield: Privacy Score Modelmentioning
confidence: 93%
“…Many background studies and our previous work on dynamic analysis has revealed that most of the apps share user's data in clear text over the network [24]. The privacy concerns get multiplexed because the permissions are coarsely-grained.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations