Author:
Okebule T., ,Adeyemo Oluwaseyi A.,Olatunji K. A.,Awe A. S.,
Abstract
The advent of android operating systems introduced tools to keep track of users’ information activities and prevent information leakage which bridged the trust between application developers and consumers. A review of related literature shows that several phenomena had been developed to prevent malicious applications from stealing personal sensitive information from smart phones but there is still the need for efficient solutions. This study presents a literature review of works on content Analyzers for information leakage detection and prevention on android-based devices. The review will help to combine different concept to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks.
Publisher
Afe Babalola University Ado-Ekiti
Reference97 articles.
1. Adam, P., Fuchs, Avik, C. and Jeffrey, S. (2009). SCanDroid; Automated Security Certification of Android Applications. Technical Report CS-TR-4991, Department of Computer Science, University of Maryland, 12(1):103-108.
2. Adrienne, P. F., Erika, C, Steve, H., Dawn, S and David, W. (2011). Android Permissions Demystified. Proceedings of the 18th ACM Conference on Computer and Communications Security, 11(1): 627-638.
3. Agrawal R. and Srikant R. (2000). Privacy-preserving data mining, in Proceedings of the 2000 ACM SIGMOD International conference,:439-450.
4. Agrawal R., Gehrke J. and Gunopulos D. (1998) Automatic subspace clustering of high dimensional data for data mining applications, in Proceedings of the ACM SIGMOD International Conference on Management of Data: 94-105.
5. Alassi D. and Alhajj R. (2013) Effectiveness of template detection on noise reduction and websites summarization, Information Sciences, 219: 41-72.