SlideShare a Scribd company logo
1 of 3
An App to Log Location Mining
Apps in Android Appliances
By
Nazir Ahmad Dar1 [nazir.cuk@gmail.com]
Afaq Alam Khan2
1ApTech (ILM Infinity), Parraypora Srinagar
2Department of IT, Central University of Kashmir
Venue:
Department of Electronics
and Instrumentation
Technology,
University of Kashmir,
Srinagar, Kashmir, J&K,
India, 190006
UGC Sponsored National Seminar on
Electronic Devices, Systems and Information Security
18-19 March 2016
nazir.cuk@gmail.com
ISBN(Print) 978-93-82288-6 ; page –
Copyright and peer review of this paper research Lies with University of
Kashmir, Srinagar
https://www.academia.edu/23521533/An_App_to_Log_Location_Mining_Apps_in_
Android_Appliances
Android is undoubtedly the most widely used operating system for mobile phones and
tablets. Its market share is high as compared to other mobile operating systems even
higher than iOS. Such a huge base of users makes Android an ideal target for malwares.
There has been a rapid increase in the number of malware attacks. Even though
malware detection is one of the major concerns in mobile computing but data mining
intrusive apps are emerging as a major challenge nowadays. Such apps can be more
dangerous to users than malwares. Mobile phones do store sensitive data and leakage of
this information can be risky. Geo-located data is valuable and snooping on geo-location
is one of the primary tasks of malicious apps. Android provides a passive security
mechanism to publish apps on play-store. Therefore, it is not proving to be much
effective in case of data leakage. This paper proposes an app which constructs logs of
apps which mine location of a device. The app inspects on Manifest files, Intents, app
description and the network traffic statistics of an app. This lets the users know which
app is mining its location. Hence, a user can check the maliciousness of an app.
Besides, a learning algorithm can be applied to the logs generated for the malware
detection purpose.
 Apps needlessly mining personal data of the user on the
device. One in four apps doing this.
 Data often sold to third party marketers.
 Data leakage may pose some risks both social as well as
professional.
 Geo-Located data most valuable for advertisers.
 Most intrusive apps mining geo-located data.
 74% of smartphone users use LBS
NazirAhmadDarSEEDS–2016
An App to Log Location Mining Apps in Android SEEDS-2016

More Related Content

What's hot

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges Atchison Frazer
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578skowshik
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 
Build the future of mobile apps with facebook mobile app europe berlin sept 14
Build the future of mobile apps with facebook   mobile app europe berlin sept 14Build the future of mobile apps with facebook   mobile app europe berlin sept 14
Build the future of mobile apps with facebook mobile app europe berlin sept 14Julien Lesaicherre
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacyEntefy
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?IBM Security
 
ANDROID PROJECTS 2014
ANDROID PROJECTS 2014ANDROID PROJECTS 2014
ANDROID PROJECTS 2014allmightinfo
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 

What's hot (20)

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile security
Mobile securityMobile security
Mobile security
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
20120140504023
2012014050402320120140504023
20120140504023
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
Build the future of mobile apps with facebook mobile app europe berlin sept 14
Build the future of mobile apps with facebook   mobile app europe berlin sept 14Build the future of mobile apps with facebook   mobile app europe berlin sept 14
Build the future of mobile apps with facebook mobile app europe berlin sept 14
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
ANDROID PROJECTS 2014
ANDROID PROJECTS 2014ANDROID PROJECTS 2014
ANDROID PROJECTS 2014
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 

Viewers also liked

4656 4660.output
4656 4660.output4656 4660.output
4656 4660.outputj1075017
 
4726 4730.output
4726 4730.output4726 4730.output
4726 4730.outputj1075017
 
4261 4265.output
4261 4265.output4261 4265.output
4261 4265.outputj1075017
 
Roles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century educationRoles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century educationmajajoysevilla
 
20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_es20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_esAngeles Ruiz
 
5206 5210.output
5206 5210.output5206 5210.output
5206 5210.outputj1075017
 
4421 4425.output
4421 4425.output4421 4425.output
4421 4425.outputj1075017
 
4636 4640.output
4636 4640.output4636 4640.output
4636 4640.outputj1075017
 
Shared_Value_Mark_Kramer
Shared_Value_Mark_KramerShared_Value_Mark_Kramer
Shared_Value_Mark_KramerDr. Amit Kapoor
 
Πιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy DeviceΠιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy DeviceAnercia
 
4906 4910.output
4906 4910.output4906 4910.output
4906 4910.outputj1075017
 
Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)Elias Gratsias
 
EJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOSEJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOS1072748158
 
Ikea Brand Audit
Ikea Brand AuditIkea Brand Audit
Ikea Brand AuditJohn Fell
 

Viewers also liked (17)

4656 4660.output
4656 4660.output4656 4660.output
4656 4660.output
 
4726 4730.output
4726 4730.output4726 4730.output
4726 4730.output
 
4261 4265.output
4261 4265.output4261 4265.output
4261 4265.output
 
Roles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century educationRoles and-function-of-educational-technology in the 21st century education
Roles and-function-of-educational-technology in the 21st century education
 
20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_es20 claves educativas_para_el_2020_es
20 claves educativas_para_el_2020_es
 
5206 5210.output
5206 5210.output5206 5210.output
5206 5210.output
 
No Title
No TitleNo Title
No Title
 
4421 4425.output
4421 4425.output4421 4425.output
4421 4425.output
 
4636 4640.output
4636 4640.output4636 4640.output
4636 4640.output
 
Shared_Value_Mark_Kramer
Shared_Value_Mark_KramerShared_Value_Mark_Kramer
Shared_Value_Mark_Kramer
 
Sociedad de consumo
Sociedad de consumoSociedad de consumo
Sociedad de consumo
 
Balanced Translocation
Balanced TranslocationBalanced Translocation
Balanced Translocation
 
Πιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy DeviceΠιστοποίηση Electric Potential Therapy Device
Πιστοποίηση Electric Potential Therapy Device
 
4906 4910.output
4906 4910.output4906 4910.output
4906 4910.output
 
Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)Deta Elis - DeVita Mini Energy Presentation (greek language)
Deta Elis - DeVita Mini Energy Presentation (greek language)
 
EJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOSEJERCICIO Y SUS BENEFICIOS
EJERCICIO Y SUS BENEFICIOS
 
Ikea Brand Audit
Ikea Brand AuditIkea Brand Audit
Ikea Brand Audit
 

Similar to Ppt crc nazir_seeds

Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OSPranav Saini
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsFACE
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSIJNSA Journal
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system forIJNSA Journal
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature ReviewAhmed Sabbah
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applicationsijtsrd
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...ijmnct
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware DetectionIRJET Journal
 

Similar to Ppt crc nazir_seeds (20)

Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Ppt crc nazir_seeds

  • 1. An App to Log Location Mining Apps in Android Appliances By Nazir Ahmad Dar1 [nazir.cuk@gmail.com] Afaq Alam Khan2 1ApTech (ILM Infinity), Parraypora Srinagar 2Department of IT, Central University of Kashmir Venue: Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, Kashmir, J&K, India, 190006 UGC Sponsored National Seminar on Electronic Devices, Systems and Information Security 18-19 March 2016 nazir.cuk@gmail.com ISBN(Print) 978-93-82288-6 ; page – Copyright and peer review of this paper research Lies with University of Kashmir, Srinagar https://www.academia.edu/23521533/An_App_to_Log_Location_Mining_Apps_in_ Android_Appliances
  • 2. Android is undoubtedly the most widely used operating system for mobile phones and tablets. Its market share is high as compared to other mobile operating systems even higher than iOS. Such a huge base of users makes Android an ideal target for malwares. There has been a rapid increase in the number of malware attacks. Even though malware detection is one of the major concerns in mobile computing but data mining intrusive apps are emerging as a major challenge nowadays. Such apps can be more dangerous to users than malwares. Mobile phones do store sensitive data and leakage of this information can be risky. Geo-located data is valuable and snooping on geo-location is one of the primary tasks of malicious apps. Android provides a passive security mechanism to publish apps on play-store. Therefore, it is not proving to be much effective in case of data leakage. This paper proposes an app which constructs logs of apps which mine location of a device. The app inspects on Manifest files, Intents, app description and the network traffic statistics of an app. This lets the users know which app is mining its location. Hence, a user can check the maliciousness of an app. Besides, a learning algorithm can be applied to the logs generated for the malware detection purpose.
  • 3.  Apps needlessly mining personal data of the user on the device. One in four apps doing this.  Data often sold to third party marketers.  Data leakage may pose some risks both social as well as professional.  Geo-Located data most valuable for advertisers.  Most intrusive apps mining geo-located data.  74% of smartphone users use LBS NazirAhmadDarSEEDS–2016 An App to Log Location Mining Apps in Android SEEDS-2016