Loughborough University
Browse
Kostas_A Look Into the Information Your Smartphone Leaks.pdf (1.12 MB)

A look into the information your smartphone leaks

Download (1.12 MB)
conference contribution
posted on 2017-09-19, 08:56 authored by Timothy Chadza, Francisco J. Aparicio-Navarro, Kostas KyriakopoulosKostas Kyriakopoulos, Jonathon Chambers
Mobile applications (APPs) are highly integrated in our daily life. Users benefit from the services that they provide. However, some APPs also pose a risk to users’ personal information. Incidents of APPs leaking information stored in smartphones illustrate the danger that they present. In this paper, we investigate the amount of personal information leaked during the installation and use of APPs when accessing the Internet. We have opted for the implementation of a Man-in-the-Middle proxy to intercept the network traffic generated by 20 popular free APPs installed on different smartphones of distinctive vendors. This work describes the technical considerations and requirements for the deployment of the monitoring WiFi network employed during the conducted experiments. The presented results show that numerous mobile and personal unique identifiers, along with personal information are leaked by several of the evaluated APPs, commonly during the installation process.

Funding

This work was supported by the Engineering and Physical Sciences Research Council (EPSRC) Grant number EP/K014307/2 and the MOD University Defence Research Collaboration in Signal Processing

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Published in

International Symposium on Networks, Computers and Communications

Citation

CHADZA, T. ... et al., 2017. A look into the information your smartphone leaks. Presented at the International Symposium on Networks, Computers and Communications (ISNCC 2017), Marrakech, Morocco, 16-18th May.

Publisher

© IEEE

Version

  • AM (Accepted Manuscript)

Publisher statement

© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Acceptance date

2017-03-26

Publication date

2017-10-19

Notes

This article was published in the 2017 International Symposium on Networks, Computers and Communications (ISNCC) [© IEEE] and the definitive version is available at: https://doi.org/10.1109/ISNCC.2017.8072022

ISBN

9781509042609

Language

  • en

Location

Marrakech, Morocco

Event dates

16-18 May 2017