Privacy guard contact info8/11/2023 ![]() ![]() Privacy Guard shows the list of all the activated permissions with a brief description. It’s possible to explore the details of each app. These values act as a penalty to the base score.įirst of all the application shows a message to synthetize the analysis’ results and the list of all the applications with the related data leakage score, while if there are one or more applications that exceed a certain threshold, at the top of screen will be showed a message that indicates the number of applications that exceed this value. Every combination of this subcategories was considered, assigning a score, ranging from 1 to 10, to each combination. The communication permissions have been divided considering range and bandwidth. In order to take this into account, the hardware and data access categories have been divided in sub-categories:Ĭhange hardware configuration Personal data access However, (1) to represent data leakage capabilities of applications is not enough: some permissions are far more dangerous if used in combination with other permissions. After empirical considerations, it has been assigned the value 7. Wd: weight assigned to data permissions. ![]() After empirical considerations, it has been assigned the value 3 Wh: weight assigned to hardware permissions.MAX(C): the maximum value among the communication permissions requested by an application.Dn: the normalized sum of data permissions’ score requested by an application.Hn : the normalized sum of hardware permissions’ score requested by an application.To compute a value representing applications’ data leakage capabilities the followed formula has been developed: System permissions : every permission which can be requested only by system applications.Communication permissions: every permission which gives the chance to send information either over a network or to another device.Data access permissions: every permission which requests a direct access to data stored on the devices.Hardware permissions: every permission which requests a direct access to a hardware device.The permissions have been divided in four categories: Permissions have been grouped in categories and each permission has been assigned a score, ranging from 1 to 10, to describe its dangerousness. ![]() On the basis of our studies on malicious apps that exfiltrate sensitive data, we created a model that identifies which apps have the most dangerous combination of permssions. : Privacy Guard is an Android app that evaluates the risks of data privacy relying on the permissions requested by the apps installed on a device. In order to increase the awareness of user towards the possibility of data leakage and the importance of protecting personal data stored in smartphones, we developed : “ Privacy Guard”. Mobile devices collect a large volume of personal information that could be used with malicious purposes.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |