Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities

dc.contributor.advisorHuang, Stephen
dc.contributor.committeeMemberShi, Weidong
dc.contributor.committeeMemberBronk, Chris
dc.creatorLu, Xi 1993-
dc.date.accessioned2019-09-13T21:47:07Z
dc.date.available2019-09-13T21:47:07Z
dc.date.createdMay 2017
dc.date.issued2017-05
dc.date.submittedMay 2017
dc.date.updated2019-09-13T21:47:08Z
dc.description.abstractIn order to make apps functional, mobile operating systems, such as Android, allow applications to access some system data without asking for user permission. We demonstrate that by analyzing these system data and some side channel information, it is possible to gain insight into a smartphone user’s behavior, thus putting their privacy at risk. With these real-time privacy information collected, a malicious attacker may launch spear phishing attacks with much higher yield rates. In this thesis, we study a combination of power consumption, network traffic, and memory usage of several commonly used activities, and demonstrated that it is possible to classify a user’s smartphone activities into one of six categories, which are Video, Game, Internet, Music, Idle, and Phone Call. We designed several experiments to test the classification which resulted in high success rates. We also present the possibility of detecting transitions of smartphone activities.
dc.description.departmentComputer Science, Department of
dc.format.digitalOriginborn digital
dc.format.mimetypeapplication/pdf
dc.identifier.citationPortions of this document appear in: Lu, Xi, and Shou-Hsuan Stephen Huang. "Malicious Apps May Explore a Smartphone's Vulnerability to Detect One’s Activities." In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 787-794. IEEE, 2017.
dc.identifier.urihttps://hdl.handle.net/10657/4551
dc.language.isoeng
dc.rightsThe author of this work is the copyright owner. UH Libraries and the Texas Digital Library have their permission to store and provide access to this work. UH Libraries has secured permission to reproduce any and all previously published materials contained in the work. Further transmission, reproduction, or presentation of this work is prohibited except with permission of the author(s).
dc.subjectVulnerability
dc.subjectSide channel
dc.subjectMobile phone
dc.subjectSmartphone
dc.subjectAndroid
dc.titleMalicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities
dc.type.dcmiText
dc.type.genreThesis
thesis.degree.collegeCollege of Natural Sciences and Mathematics
thesis.degree.departmentComputer Science, Department of
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Houston
thesis.degree.levelMasters
thesis.degree.nameMaster of Science

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LU-THESIS-2017.pdf
Size:
715.49 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
LICENSE.txt
Size:
1.81 KB
Format:
Plain Text
Description: