dc.contributor.author | Rubin, Julia | |
dc.contributor.author | Gordon, Michael I. | |
dc.contributor.author | Nguyen, Nguyen | |
dc.contributor.author | Rinard, Martin C. | |
dc.date.accessioned | 2015-11-20T13:13:50Z | |
dc.date.available | 2015-11-20T13:13:50Z | |
dc.date.issued | 2015-11 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/99941 | |
dc.description.abstract | This paper studies communication patterns in mobile applications. Our analysis shows that 63% of the external communication made by top-popular free Android applications from Google Play has no effect on the user-observable application functionality. To detect such covert communication in an efficient manner, we propose a highly precise and scalable static analysis technique: it achieves 93% precision and 61% recall compared to the empirically determined “ground truth”, and runs in a matter of a few minutes. Furthermore, according to human evaluators, in 42 out of 47 cases, disabling connections deemed covert by our analysis leaves the delivered application experience either completely intact or with only insignificant interference. We conclude that our technique is effective for identifying and disabling covert communication. We then use it to investigate communication patterns in the 500 top-popular applications from Google Play. | en_US |
dc.description.sponsorship | United States. Defense Advanced Research Projects Agency (Agreement FA8750-12-2-0110) | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://ase2015.unl.edu/#tab-papers | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Covert Communication in Mobile Applications | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Rubin, Julia, Michael I. Gordon, Nguyen Nguyen, and Martin Rinard. "Covert Communication in Mobile Applications." 30th IEEE/ACM International Conference on Automated Software Engineering (November 2015). | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Rubin, Julia | en_US |
dc.contributor.mitauthor | Rubin, Julia | en_US |
dc.contributor.mitauthor | Gordon, Michael I. | en_US |
dc.contributor.mitauthor | Rinard, Martin C. | en_US |
dc.relation.journal | Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Rubin, Julia; Gordon, Michael I.; Nguyen, Nguyen; Rinard, Martin | en_US |
dc.identifier.orcid | https://orcid.org/0000-0001-7280-1614 | |
dc.identifier.orcid | https://orcid.org/0000-0001-8095-8523 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |