(IN-) PRIVACY IN MOBILE APPS. CUSTOMER OPPORTUNITIES (in Engl.)
Annotation
Subject of Study. The paper presents the results of an investigation of cross-platform mobile applications. This paper focuses on a cross-platform app data investigation in purpose of creating a database that helps to make decisions from data privacy viewpoint. These decisions refer to knowledge about mobile apps that are available to the public, especially on how consumer data is protected while it is stored locally or transferred via network as well as what type of data may leak. Methods. This paper proposes a forensics methodology as a cornerstone of an app data investigation process. The object of research is an application data protection under different security control types among modern mobile OS. The subject of research is a modification of forensics approach and behavioral analysis to examine application data privacy in order to find data that are not properly handled by applications which lead to data leakages, defining protection control type without forensics limits. In addition, this paper relies on using the simplest tools, proposing a limit to examine locally stored data and transmitted over the network to cover all data, excluding memory and code analysis unless it is valuable (behavioral analysis). The research methods of the tasks set in the paper include digital forensics approach methods depending on data conception (at-rest, in-use/memory, in-transit) with behavioral analysis of application, and static and dynamic application code analysis. Main Results. The research was carried out for the scope of that thesis, and the following scientific results were obtained. First, the methods used to investigate the privacy of application data allow considering application features and protection code design and flaws in the context of incomplete user awareness about the privacy state due to external activity of the developer. Second, the knowledge set about facts of application data protection that allows making a knowledge database to implement the missing privacy and security protection control and provide the privacy requirements (keeping the users informed about possibility to avoid untrusted usage cases). Practical Relevance. Practical relevance of the received results is the following: first, the set of knowledge facts about each examined application to privacy score per application, per application category (IM, travel, etc.), per OS, etc; second, the developed method under the forensics approach can be used to carry out analysis of the application data privacy in relation to the specified requirements including audit, reconfiguring EMM application policiesand reasons for theircommissioning.
Keywords
Постоянный URL
Articles in current issue
- TRENDS IN THE DEVELOPMENT OF DETONATION ENGINES FOR HIGH-SPEED AEROSPACE AIRCRAFTS AND THE PROBLEM OF TRIPLE CONFIGURATIONS OF SHOCK WAVES. Part I. Research of detonation engines
- SPECIAL ASPECTS OF INITIAL OPTICAL SCHEME SELECTION FOR DESIGN OF NON-IMAGING OPTICAL SYSTEMS
- APPLICATION OF CHEMOMETRICS FOR ANALYSIS OF BIOAEROSOLS BY FLOW-OPTICAL METHOD
- APPROACH TO AUTOMATION OF LENS COMPONENTS CENTERING FOR ASSEMBLING OF DIFFERENT DESIGN OBJECTIVES
- METHOD FOR CREATION OF SPHERICAL PANORAMAS FROM IMAGES OBTAINED BY OMNIDIRECTIONAL OPTOELECTRONIC SYSTEMS
- LINE-FIELD SWEPT-SOURCE OPTICAL COHERENCE TOMOGRAPHY SYSTEM FOR NEAR INFRARED SPECTRAL REGION
- BACKSTEPPING ALGORITHM FOR LINEAR SISO PLANTS UNDER STRUCTURAL UNCERTAINTIES
- RESEARCH OF FREE MOTION TRAJECTORIES FEATURES OF CONTINUOUS SYSTEM DEFINED AS A CONSECUTIVE CHAIN OF IDENTICAL FIRST-ORDER APERIODIC LINKS
- SPECTRAL CHARACTERISTICS OF MID-INFRARED LIGHT-EMITTING DIODES BASED ON InAs (Sb,P)
- SIMULATION OF SENSING ELEMENT OF TEMPERATURE SENSOR BASED ON SILICATE GLASS WITH SODIUM NANOPARTICLES
- PRINCIPLES OF INDICATION FOR EN-ROUTE FLIGHT PATHS OF THE AIRCRAFT ON THE SCREEN OF ON-BOARD DISPLAY DEVICES
- ERROR CORRECTION METHOD FOR SEQUENCING DATA WITH INSERTIONS AND DELETIONS
- CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK
- SYNTHESIS OF THE SECONDARY STRUCTURE OF ALGEBRAIC BAYESIAN NETWORKS: AN INCREMENTAL ALGORITHM AND STATISTICAL ESTIMATION OF ITS COMPLEXITY
- EFFECT OF MICROPHONES NON-IDENTITY ON THE MICROPHONE ARRAYS CHARACTERISTICS
- QUALITY CONTROL AUTOMATED LASER-ULTRASONIC METHOD FOR SOLDER JOINTS OF NOZZLES OF CHAMBERS IN LIQUID ROCKET ENGINES
- ROBUST MODIFICATION OF THE LASSO METHOD FOR GENOME-WIDE ASSOCIATION STUDY IN VIEW OF TARGET PHENOTYPE VALUES
- BENCHMARK SOLUTIONS FOR STOKES EQUATIONS WITH VARIABLE VISCOSITY IN CYLINDRICAL AND SPHERICAL COORDINATES
- INFORMATIONAL MODEL OF MENTAL ROTATION OF FIGURES
- WENO SCHEMES FOR SOLUTION OF UNSTEADY ONE-DIMENSIONAL GAS DYNAMICS TEST PROBLEMS
- AUTOMATED CONTROL SIMULATION OF PROFESSIONAL SKILLS FORMATION FOR PRODUCTION SYSTEM OPERATOR
- STUDY OF OPTICAL AND LUMINESCENT PROPERTIES OF POTASSIUM-ALUMINA-BORATE GLASS DOPED WITH Cr3+ IONS
- SPEAKER-DEPENDENT FEATURES FOR SPONTANEOUS SPEECH RECOGNITION