• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Tu, Tengfei (Tu, Tengfei.) | Zhang, Hua (Zhang, Hua.) | Gong, Bei (Gong, Bei.) (Scholars:公备) | Du, Daizhong (Du, Daizhong.) | Wen, Qiaoyan (Wen, Qiaoyan.)

Indexed by:

EI Scopus SCIE

Abstract:

With the continuous development of mobile devices, mobile applications bring a lot of convenience to people's lives. The abuse of mobile device permissions is prone to the risk of privacy leakage. The existing detection technology can detect the inconsistency between the declared authority and the actual use authority. But using the third-party privacy policy as the analysis basis for SDK permissions will result in a large set of extracted declaration permissions, which will lead to identifying risky applications as normal applications during consistency comparison. The prevailing approach involves utilizing models based on TextCNN to extract information from privacy policies. However, the training of TextCNN relies on large-scale annotated datasets, leading to high costs. This paper uses BERT as the word vector extraction model to obtain private phrases from the privacy policy. And then we use cosine similarity to automatically filter permission phrase samples, reducing the workload of manual labeling. On the other hand, existing methods do not support the analysis of Chinese privacy policies. In order to solve the problem of consistency judgment between Chinese privacy policy and permission usage, we implement a BERT-based Android privacy policy and permission usage consistency analysis engine. The engine first uses static analysis to obtain the permission list of Android applications, and then combines the BERT model to achieve consistency analysis. After functional and speed testing, we found that the engine can successfully run the consistency analysis function of Chinese declaration permissions and usage permissions, and it is better than the existing detection methods.

Keyword:

Privacy policy Mobile applications Policy conflicts Text extraction Android security

Author Community:

  • [ 1 ] [Tu, Tengfei]Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing 100876, Peoples R China
  • [ 2 ] [Zhang, Hua]Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing 100876, Peoples R China
  • [ 3 ] [Du, Daizhong]Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing 100876, Peoples R China
  • [ 4 ] [Wen, Qiaoyan]Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing 100876, Peoples R China
  • [ 5 ] [Gong, Bei]Beijing Univ Technol, 100 Hepingyuan, Beijing 100021, Peoples R China

Reprint Author's Address:

  • [Zhang, Hua]Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing 100876, Peoples R China;;[Gong, Bei]Beijing Univ Technol, 100 Hepingyuan, Beijing 100021, Peoples R China;;

Show more details

Related Keywords:

Source :

ARTIFICIAL INTELLIGENCE REVIEW

ISSN: 0269-2821

Year: 2024

Issue: 7

Volume: 57

1 2 . 0 0 0

JCR@2022

Cited Count:

WoS CC Cited Count: 1

SCOPUS Cited Count: 3

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 6

Affiliated Colleges:

Online/Total:863/10663817
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.