{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T05:27:03Z","timestamp":1673933223267},"reference-count":20,"publisher":"IGI Global","issue":"3","license":[{"start":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T00:00:00Z","timestamp":1657238400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T00:00:00Z","timestamp":1657238400000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T00:00:00Z","timestamp":1657238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,8]]},"abstract":"<p>This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior of applications without modifying the Android framework and the application's source code. Based on this method, a privacy data protection policy that reflects users' intentions is proposed by extracting and recording the privacy data usage in applications. Moreover, an optimized random forest algorithm is proposed to reduce the policy training time. The result shows that the system realizes the functions of application runtime behavior monitor and control. An experiment on 134 widely used applications shows that the basic privacy policy could satisfy the majority of users' privacy intentions.<\/p>","DOI":"10.4018\/ijdcf.2018070108","type":"journal-article","created":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T16:20:52Z","timestamp":1525364452000},"page":"1-19","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control"],"prefix":"10.4018","volume":"10","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Ran","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Wenhao","family":"Fan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yuan'An","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hui","family":"Lu","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2018070108-0","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/2382196.2382222","article-title":"Pscout: analyzing the android permission specification.","author":"K. W. Y.Au","year":"2012","journal-title":"Proceedings of the 2012 ACM conference on Computer and communications security"},{"key":"IJDCF.2018070108-1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"IJDCF.2018070108-2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"IJDCF.2018070108-3","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"IJDCF.2018070108-4","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"IJDCF.2018070108-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"IJDCF.2018070108-6","first-page":"291","article-title":"AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.","volume":"12","author":"C.Gibler","year":"2012","journal-title":"Trust"},{"key":"IJDCF.2018070108-7","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: an update. ACM SIGKDD explorations newsletter, 11(1), 10-18.","DOI":"10.1145\/1656274.1656278"},{"key":"IJDCF.2018070108-8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"IJDCF.2018070108-9","unstructured":"Kim, J., Yoon, Y., Yi, K., Shin, J., & Center, S. W. R. D. (2012). ScanDal: Static analyzer for detecting privacy leaks in android applications."},{"key":"IJDCF.2018070108-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2792-2_50"},{"key":"IJDCF.2018070108-11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"IJDCF.2018070108-12","doi-asserted-by":"publisher","DOI":"10.1109\/IndiaCom.2014.6828062"},{"key":"IJDCF.2018070108-13","unstructured":"Maritza, S. (2016). iOS, Android Apps Found Leaking User Privacy Data, Researchers Say. Tripwire. Retrieved from https:\/\/www.tripwire.com\/state-of-security\/latest-security-news\/ios-android-apps-found-leaking-user-privacy-data-researchers-say\/"},{"key":"IJDCF.2018070108-14","doi-asserted-by":"crossref","unstructured":"Schreckling, D., K\u00f6stler, J., & Schaff, M. (2013). Kynoid: real-time enforcement of fine-grained, user-defined, and data-centric security policies for android. Information Security Technical Report, 17(3), 71-80.","DOI":"10.1016\/j.istr.2012.10.006"},{"key":"IJDCF.2018070108-15","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2012.43"},{"key":"IJDCF.2018070108-16","doi-asserted-by":"publisher","DOI":"10.1021\/ci034160g"},{"key":"IJDCF.2018070108-17","article-title":"Aurasium: practical policy enforcement for android applications.","author":"R.Xu","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"IJDCF.2018070108-18","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"IJDCF.2018070108-19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_7"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=205526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:16:03Z","timestamp":1673907363000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2018070108"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,7,8]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2018070108","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,8]]}}}