Next Article in Journal
Electricity Spot Price Forecast by Modelling Supply and Demand Curve
Next Article in Special Issue
An Improved Model for Kernel Density Estimation Based on Quadtree and Quasi-Interpolation
Previous Article in Journal
An Adaptive ANP & ELECTRE IS-Based MCDM Model Using Quantitative Variables
Previous Article in Special Issue
Hypergraph and Uncertain Hypergraph Representation Learning Theory and Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices

School of Information Science and Engineering, Yanshan University, Qinhuangdao 066000, China
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(12), 2011; https://doi.org/10.3390/math10122011
Submission received: 6 May 2022 / Revised: 7 June 2022 / Accepted: 9 June 2022 / Published: 10 June 2022
(This article belongs to the Special Issue Engineering Calculation and Data Modeling)

Abstract

:
(1) Background: Smart mobile devices provide conveniences to people’s life, work, and entertainment all the time. The basis of these conveniences is the data exchange across the entire cyberspace, and privacy data leakage has become the focus of attention. (2) Methods: First, we used the method of directed information flow to conduct an API test for all applications in the application market, then obtained the application data transmission. Second, by using tablet computers, smart phones, and bracelets as the research objects, and taking the scores of senior users on the selected indicators as the original data, we used the fusion information entropy and Markov chain algorithm skillfully to build a data leakage risk assessment mode to obtain the steady-state probability values of different risk categories of each device, and then obtained the entropy values of three devices. (3) Results: Tablet computers have the largest entropy in the risk of data leakage, followed by bracelets and mobile phones. (4) Conclusions: This paper compares the risk situation of each risk category of each device, and puts forward simple avoidance opinions, which might lay a theoretical foundation for subsequent research on privacy protection strategies, image steganography, and device security improvements.

1. Introduction

With the rapid development of science and technology, the electronic platform is becoming more and more intelligent and mobile, which has brought great convenience to people’s life. Today, with the prevalence of big data, the data itself are also spreading along the trend of large depth, high production speed, wide dimensions, and low density. At the same time, the means for hackers to steal information is also powerful, resulting in the outflow of a large number of personal privacy data [1]. Information leakage has become a hot topic in today’s cyberspace. How to detect, describe, and even protect privacy has become the focus of the netizens’ close attention.
In 2018, the personal information of 87 million Facebook users was leaked. In September of the same year, the information of another 30 million users was leaked due to hacker attacks, and the data of 68 million users were leaked due to software vulnerabilities on 14 December. On 10 January 2019, Bob Diachenko, a hackenproof security researcher, found that the detailed resume information of more than 202 million Chinese job seekers in the mongodb database was published online, which was suspected to be leaked by third-party applications. It is reported that the 202 million resumes stored in this database contain 202,730,434 records with very detailed information including the applicant’s name, height, weight, address, date of birth, telephone number, email address, political orientation, skills, work experience, salary expectation, marital status, driver’s license number, professional experience, and career expectation, totaling 854 gb. In August 2020, a logistics company in Hebei Province, China reported that its employee account was monitored by the company’s logistics risk control system for the illegal inquiry of the waybill number information of non-local outlets, resulting in the possible disclosure of a large number of the customers’ privacy information. On the evening of 15 March this year, the annual “15 March” party was broadcast on the central finance and economics channel. The link of “improving digital rules and building Internet economic confidence” exposed the problem of personal privacy leakage in enterprises: Zhilian recruitment failed to pass the examination of enterprises, resulting in a large number of downloads of the resumes of job seekers. As a result, there are many risks of private information leakage around us.
“Privacy computing theory” first appeared in 1999. It pointed out that information will be leaked only when device users think that the benefits are equal to the risks [1,2]. Guo Yu’s research showed that data information disclosure positively affected the privacy information disclosure behavior, perceived mobile learning profitability, and privacy control while self-efficacy positively affected the privacy information disclosure intention, and the perceived mobile learning risk negatively affected the users’ privacy information disclosure intention [3]. By studying the privacy information disclosure behavior and protection of mobile device users, Xiong Jian showed that the factors of the perceived benefits and perceived risks had a strong impact on the users’ self-perceived willingness [4]. Wang Kan used comprehensive fuzzy evaluation to evaluate the risk of data leakage in a transaction, in which the risk factors included network access control, network application protocols, firewalls, and identity authentication [5]. Zhao Zhuohe found that the wireless network used by mobile devices was easy to intercept, resulting in important information and data being stolen [6]. Li Yanhui believed that the wireless network is open and easy to obtain its internal structure, so as to obtain important data nodes for targeted interception [7]. Xu Jiale suggested that the social network or platform failed to strictly control the enterprise qualification, resulting in the platform’s inability to trace the source of information leakage [8]. Makhdoom believed that anonymous encryption could make greater efforts to ensure that receipts were not disclosed [9]. To sum up, for smart mobile devices, the risk of user information disclosure is distributed in all corners of cyberspace. Although there are many studies on the risk of privacy disclosure, only a few can comprehensively and in detail describe the risk factors of privacy disclosure and evaluate the risk of the information disclosure of tablets, smartphones, and bracelets. Therefore, this paper subdivides and expands the risk factor indicators considered in the above articles, and finally combined them into five categories and 24 risk indicators to comprehensively evaluate the risk of the privacy disclosure of tablets, smartphones, and bracelets.
First, based on the directed information flow detection risk application, this paper constructed an information flow model to track and analyze the privacy points in real time. Then, it summarizes the various risk factors of intelligent mobile devices in wireless networks, selects the risk indicators, and constructs an evaluation model based on information entropy and Markov chain. Finally, according to the evaluation results, targeted preventive measures will be issued and implemented.

2. Malicious Application Detection Based on Directed Information Flow

2.1. Basic Theory

Information flow is a classic method to detect the information leakage of risky applications. This method was born in 1976 and is based on Denning’s grammatical information flow analysis:
F M = N , P , S C , ,
where N is the set of some logical elements (code segments, variables, etc.) in the system; P is the collection of processes and the response subject of information flow; SC is the collection of safety levels, which is used to judge whether the operation behavior is legal; is the operational supremum of the security level, and the result is the minimum common upper bound of security levels A and B. This indicates the flow direction of the information flow, which means that the information in A is allowed to flow to B [10,11].
The syntax information flow detection steps are shown in Figure 1.
In addition to malicious applications, privacy information leakage may also occur in various stages of big data computing. As shown in Figure 2, under the cloud platform-based big data computing, privacy leakage may occur during the data transmission from the application to the cloud service provider, the cloud platform computing process, and the cloud platform data output phase. Therefore, we focused on detecting private data, and whether this is directly transmitted to the external cyberspace, and if so, if the application software is regarded as software with the risk of privacy leakage.
The method can roughly be divided into three steps: first, abstract the information flow, analyze the object source code, and extract the idiom meaning of the information manifold in each line of code [2,12]. The second is to form the information flow formula, which requires the design of an information flow strategy [13]. Finally, the formula is used to verify whether the information flow formula complies with the security level agreement. If it does, it indicates that the formula is correct, otherwise, it indicates that there is a potential security hazard. In order to avoid the problem of false alarms, the verification is carried out again according to the information flow method after appropriate treatment. If it fails to pass the security level agreement many times, it will be recognized as a potential safety hazard.
Directed information flow: According to the privacy point dataset, analyze all function calls in the Java source code and read/write privacy data, and finally form an information flow model. If private information eventually flows to the outside cyberspace, it is considered that there is a privacy disclosure [10,14]. For example, if the top function is a network connection function and passes private data as connection parameters, or the top function is a SMS sending function and sends private data as SMS content, it is considered that the application is a malicious application, which will lead to the theft of the users’ private information [15].
The output module arranges, counts, analyzes, and outputs the detection results and finally forms a complete analysis report to list the specific contents of risky applications.
A M = L , O , F ,
where AM is the information flow model; L is the set of leakage points; O is the set of all external interaction functions in all devices; and F is the set of calling and operating functions.
f l , f F , l L
If any privacy point accesses the function call, it forms a directed information flow:
f n f 2 f 1 l , f i F , l L
Moreover, f n O indicates that the privacy has been compromised, and the application is identified as a suspected malicious application output.
For multiple branch information flows:
f n f 2 f 1 l , f i F , l L
As long as one item is satisfied, f n x O , it is also recognized as a malicious application.

2.2. Network Environment

The network environment of an application or app is divided into two parts, one is the data flow between the hardware framework and the external network, and the other is the data flow from the operating system and software itself to the external network.
The network environment detection of intelligent mobile devices is carried out in the process of data exchange between the software and hardware of the device and the external network (see Figure 3 for the specific detection framework). Among them, the hardware detection mainly involves four parts: Event Signature, Event Classification, Event Input, and Event Detection [16]. Event Signature is an important part of the detection of an information leakage event and is trained according to the historical data. The target value is whether it is defined as a privacy event. After the training, it uses machine learning to classify the unknown data to be detected. Event Input is the newly generated data sample to be tested. Software testing mainly involves API (Application Programming Interface) Acquisition, APP Reverse, and API Testing [17]. The principle of software detection is to obtain the API containing privacy features from the data flowing out of the device, find the parameters or methods to generate privacy data according to the reverse tools, and detect whether there is any leakage of the tag information by changing or marking the parameter information in the software.
In the process of the detection of information leakage from mobile devices to the external cyberspace, the characteristics of risky applications and high-risk API source codes are often used (see Table 1 and Table 2 for details).

2.3. Application Detection Based on Directed Information Flow

This paper proposes a directed information flow method to detect risky applications and reverse query the information leakage path. The data source used was the application data obtained from the mobile application market. After reprocessing, it contained 9635 independent applications.
The system permission mechanism is shown in Figure 4. If an application needs to access private data, it needs to apply for the relevant access permissions through the uses-permission tag in manifest.xml to call the API integrated into the system application framework layer to access the system resources and services [18].
According to the information flow construction rules and high-risk API list, first, call the reverse tool to analyze the application, then decompile the class.dex file into the Java code file, and analyze the permission statistics results of these applications, as shown in Table 3:
In Table 3, only nine items with the most permissions are listed, of which 48.7% of applications have applied for location access, 41.5% of applications applied for permission to read photo albums, and 39.5% of applications applied for permission to read SMS. More than 98% of all applications were applied for network access.
Next, we utilized getDeviceid() to call the International Mobile Equipment Identity (IMEI) code of the device. If the starting point of the information flow is defined as before this call, the device not only accesses the IMEI number, but also other information after the call. At this time, we tracked the second information tributary, combined with the high-risk source code, and so on [19]. If the last node of the information flow includes information sending and network connection functions, then the software could be considered as a risky application.
This method was used to analyze 100 benign applications and 100 malicious applications, respectively. The benign software was downloaded from the application store, and the malicious software was downloaded from the malicious sample collection website Virus Share. The detection result was that 11 benign applications were marked as risk software, six malicious applications were not successfully identified as risk software, and the rest were correctly identified, so it can be preliminarily considered that the correct rate of malicious application identification by this method was 94%, and benign applications were correctly identified. The rate was 89%. Applying this method to the collected 9635 independent applications, we found nearly 400 risky applications, and then we verified and analyzed the results to confirm that the detection results were real and effective for the personal data or user account information on the phone.

3. Risk Assessment of Data Leakage Based on Information Entropy and Markov Chain

3.1. Construction of Evaluation Index System

This article incorporated 32 risk indicators into the privacy data leakage evaluation index system, and divided them into five categories according to their attributes: technical level, environmental level, operation management, self-level, and terminal level. The technical level mainly refers to the fact that many applications do not fully consider the security and protection of private data before they are designed. For example, the private data of individual users are not marked and deprived, and the data are often calculated in plaintext. The environmental level mainly refers to the frequent exchange of data in the current network environment and the diversification of privacy. Operation management mainly refers to the data leakage caused by application management personnel such as the malicious leakage of internal personnel, lax advertising review, etc. The user level mainly refers to the lack of privacy awareness of individual users and the simplicity of account passwords. The terminal level mainly refers to the fact that the data do not form a real security closed loop at the terminal, and the privacy protection technology is not perfect, etc. The specific detailed indicators are shown in Table 4.
Some of the secondary indicators under different primary indicators overlap. For example, the stain tracking at the technical level, the data identification at the own level, and the data control at the terminal level are themselves a risk factor. Therefore, resorting of all of the risk indicators is shown in Figure 5.
In Figure 5, the brown ellipse indicates the risk factors belonging to a single category, the black diamond indicates the risk factors belonging to multiple categories, and the blue box indicates the risk categories.

3.2. Risk Assessment of Data Leakage Based on Information Entropy and Markov Chain

Information entropy can be understood as information and entropy. Information refers to all of the information in cyberspace and the object transmitted and processed by communication system [20]. Entropy is a quantity that represents the physical state, which represents the state of an uncertain thing. The greater the quantity of eliminating uncertain factors is introduced, the greater the entropy is. If the certainty is high, there is no need to introduce too many elimination variables, and the entropy is low. Markov chain is a random process algorithm, which means that the state at any time of any random variable completely depends on the state at the previous time, and has nothing to do with the previous state [21]. The characteristics of the Markov chain have the following two aspects. First, the n-step transition is determined by one-step transition, and the n-step transition matrix is the n-th power of the one-step transition matrix. Second, after n-step transitions, the state transition matrix gradually becomes stationary [22].
This article utilized information entropy to solve the characteristics of uncertain transactions, combined with the Markov chain, which could effectively describe the changes of events, and creatively evaluate the risk of the data leakage of intelligent mobile devices. Three smart mobile devices, tablet computer, smart phone, and bracelet, were selected as the research object. Taking the 24 evaluation indices of the above three devices scored by privacy disclosure practitioners in the field of network security for many years as the result, the scores of the questionnaire were all in ten scale, and the expected value and 95% confidence interval of the corresponding indices were obtained. Finally, 237 valid questionnaires were obtained, and the probability value P ( x i ) of the corresponding risk factor was obtained as shown in Table 5.
Considering the degree of influence among the risk factors X i in Table 5, the construction matrix C is as follows:
C = X 11 X 12 X 1 n X 21 X 22 X 2 n X n 1 X n 2 X n 3 X n n
In matrix C, the main diagonal element indicates that a risk element occurs alone, while the other two risks exist at the same time. Assuming that a mobile terminal contains only two risk categories K 1 and K 2 , K 1 contains X 1 , X 2 , and X 3 , K 2 contains X 3 and X 4 , the transfer matrix [23]:
P ( C ) = P ( K 11 ) P ( K 12 ) P ( K 21 ) P ( K 22 ) = 1 i = 1 3 P ( X i ) P ( X 1 ) + P ( X 2 ) 1 i = 1 3 P ( X i ) P ( X 3 ) 1 i = 3 4 P ( X i ) P ( X 3 ) 1 i = 3 4 P ( X i ) P ( X 4 )
Then, for the five primary risk indicators and 24 secondary risk indicators in the above model, the transfer matrix is obtained:
P ( C ) = P ( K 11 ) P ( K 12 ) P ( K 15 ) P ( K 21 ) P ( K 22 ) P ( K 25 ) P ( K 51 ) P ( K 52 ) P ( K 55 ) = 1 i = 1 10 P ( X i ) [ P ( X 1 ) + + P ( X 6 ) ] 1 i = 1 10 P ( X i ) P ( X 7 ) + P ( X 8 ) 0 1 i = 1 10 P ( X i ) P ( X 22 ) 1 i = 1 10 P ( X i ) [ P ( X 24 ) + P ( X 22 ) ] 1 i = 7 12 P ( X i ) P ( X 7 ) + P ( X 8 ) 1 i = 7 12 P ( X i ) P ( X 9 ) + P ( X 10 ) 1 i = 7 12 P ( X i ) P ( X 11 ) + P ( X 12 ) 0 0 0 1 i = 11 16 P ( X i ) P ( X 11 ) + P ( X 12 ) 1 i = 11 16 P ( X i ) [ P ( X 13 ) + + P ( X 16 ) ] 0 0 1 i = 17 23 P ( X i ) P ( X 22 ) 0 0 1 i = 17 23 P ( X i ) [ P ( X 17 ) + + P ( X 19 ) ] 1 i = 17 23 P ( X i ) [ P ( X 23 ) + P ( X 22 ) ] 1 i = 21 24 P ( X i ) [ P ( X 22 ) + P ( X 24 ) ] 0 0 1 i = 21 24 P ( X i ) [ P ( X 23 ) + P ( X 22 ) ] 1 i = 21 24 P ( X i ) P ( X 21 )

4. Discussion

Obtain the result: P c o m ( C ) , P t e l ( C ) , and P b r a ( C ) :
P c o m ( C ) = 0.567 0.287 0 0.110 0.218 0.498 0.254 0.249 0 0 0 0.235 0.765 0 0 0.123 0 0 0.555 0.279 0.441 0 0 0.508 0.274
P t e l ( C ) = 0.592 0.238 0 0.113 0.235 0.408 0.291 0.301 0 0 0 0.259 0.741 0 0 0.125 0 0 0.623 0.305 0.441 0 0 0.516 0.255
P b r a ( C ) = 0.550 0.289 0 0.128 0.234 0.399 0.227 0.378 0 0 0 0.329 0.670 0 0 0.128 0 0 0.599 0.319 0.443 0 0 0.603 0.195
P c o m ( C ) , P t e l ( C ) , and P b r a ( C ) are the risk factor transfer matrices of the tablet computer, mobile phone, and wristband, respectively.
The process of finding the steady-state probability of various risks is to find the eigenvector of the state transition matrix. Because the state transition matrix is full rank, the solution vector is unique, and the elements in the solution vector are the steady-state probability value of each risk category.
The steady-state probability P ( K i ) of K i and matrix P ( C ) satisfy:
P ( K 1 ) = P ( K 11 ) P ( K 1 ) + P ( K 12 ) P ( K 2 ) + + P ( K 1 m ) P ( K m ) P ( K 2 ) = P ( K 21 ) P ( K 1 ) + P ( K 22 ) P ( K 2 ) + + P ( K 2 m ) P ( K m ) P ( K 5 ) = P ( K 51 ) P ( K 1 ) + P ( K 52 ) P ( K 2 ) + + P ( K 5 m ) P ( K m ) 1 = P ( K 1 ) + P ( K 2 ) + + P ( K 5 )
The steady-state probability values of the three devices are calculated as follows:
P c o m ( K i ) = ( 0.276 , 0.175 , 0.195 , 0.103 , 0.251 ) T
P t e l ( K i ) = ( 0.236 , 0.205 , 0.139 , 0.176 , 0.244 ) T
P b r a ( K i ) = ( 0.277 , 0.196 , 0.105 , 0.162 , 0.260 ) T
Then, bring P ( K i ) into the information entropy formula to obtain:
H = i = 1 5 P ( K i ) log 2 P ( K i )
Normalize H to obtain the entropy values of the three devices H c o m = 2.251 , H t e l = 2.294 , H b r a = 2.246 . The risk situation of different categories of each device is shown in Figure 6.
In Figure 6, the blue, red, and black lines, respectively, represent the entropy under each risk category of the tablet computer, smartphone, and bracelet. The ordinate represents the entropy value, and the abscissa represents the primary index of the dataset. First of all, tablet computers have the largest entropy at the technical level, followed by the terminal level, followed by the operation risk, platform, and self. The greater the entropy and the higher the uncertainty, the greater the possibility of information disclosure. Tablet computers are prone to privacy disclosure at the technical and terminal levels. Similarly, smartphones and bracelets are prone to information leakage at the technical and terminal levels. Conversely, smartphones and bracelets are stable at the level of operation risk, which is not easy to cause information leakage, while tablets are stable at their own level. Overall information leakage risk: according to the entropy obtained by the above three devices, the overall information leakage risk of the three devices is almost the same. From a micro perspective, P t e l ( C ) > P c o m ( C ) > P b r a ( C ) , it shows that the information leakage risk is in the order of the smartphone, tablet, and bracelet from large to small.

5. Conclusions

This paper mainly studied malicious application detection and information leakage risk assessments. First, this paper used the directed information flow algorithm, high-risk API source code, and reverse tools to detect malicious software applications and hardware systems. Second, the risk assessment of information leakage events of intelligent mobile devices was carried out. The research objects were tablet computers, smartphones, and bracelets in smart mobile devices. Generally speaking, there was little difference in the entropy of data risk assessment among the three, but there were differences in the different types of risks. According to the expectation of the tenth system, the risk of the three was low, and there was a certain degree of privacy disclosure. In terms of data operation and management, the risk value of the computer was higher than that of the mobile phone and bracelet. However, in terms of its own risk, the mobile phone was higher than that of the bracelet and computer, indicating that the operation environment of computers should be strengthened. The mobile phone and bracelet need to consolidate the firewall to reduce their own risk in the process of developing software and hardware. At the level of technology, platform, and terminal, entropy is high and the difference is small. In order to provide a more assured and pleasant network experience to network users, operators should strengthen the control and optimization of the network environment and network platform, identify and encrypt the users’ private data, and accelerate development. The hardware-supported isolation environment performs safe and efficient plaintext calculations on key codes and data, and hides the calculation mode to prevent data holders from inferring private data, strengthens identity authentication and confidentiality agreements, and ensures that user privacy data are not leaked [24]. The boundary of an app’s collection of personal privacy should be based on whether the user needs it or not, and more consideration should be given to the relevant rights and interests of the user [25]. Through this model research, it also reflects the disadvantages of the current intelligent mobile devices, and provides constructive guidance for intelligent device manufacturers and the operators’ network construction.

Author Contributions

Conceptualization, X.Y.; Data curation, X.Y.; Formal analysis, X.Y.; Funding acquisition, Y.L.; Investigation, X.Y.; Methodology, X.Y. and Y.L.; Project administration, Y.L.; Software, X.Y. and J.X.; Supervision, X.Y.; Validation, X.Y.; Visualization, X.Y.; Writing—original draft, X.Y.; Writing—review & editing, X.Y. and Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 61972334).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61972334).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, X.; Chen, H. A review of high-dimensional data publishing research on differential privacy. CAAI Trans. Intell. Syst. 2021, 16, 989–998. [Google Scholar] [CrossRef]
  2. Zhang, T. Research on Risk Factors and Risk Assessment Methods of User Privacy Disclosure in Mobile Commerce; Yunnan University of Finance and Economics: Kunming, China, 2021. [Google Scholar]
  3. Guo, Y.; Duan, Q.S.; Wang, X.W. An Empirical Study on Privacy Information Disclosure Behaviour of Mobile Learning Users. J. Mod. Inf. 2018, 38, 98–117. [Google Scholar]
  4. Xiong, J. Research on privacy information disclosure behavior and protection of mobile commerce users—From the perspective of evolutionary game theory. Fortume Times 2018, 2018, 63–64. [Google Scholar]
  5. Wang, K. Evidence Theory Based Evaluating and Controlling Mobile Commerce Transactions Risk; Huazhong University of Science and Technology: Wuhan, China, 2009. [Google Scholar]
  6. Zhao, Z.H. An Empirical Study on the Determinants of Intentions to Use Mobile SNS Applications—Take “WeiXin” for Example; Shandong University: Jinan, China, 2014. [Google Scholar]
  7. Li, Y.H.; Liang, L.T.; Liu, B.L. An Empirical Study on Privacy Beliefs and Information Disclosure Willingness of Mobile Social Users. Inf. Theory Pract. 2016, 39, 76–81. [Google Scholar]
  8. Xu, J.L.; Qiao, Z.; Wang, X.Q.; Li, F. Research and Application of Privacy Information Detection and Protection Technology for Mobile Internet Users. Telecom Eng. Tech. Stand. 2019, 2019, 12–22. [Google Scholar]
  9. Mark, F.; Alexander, B. Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany. Comput. Hum. Behav. 2015, 53, 344–353. [Google Scholar]
  10. Jia, J. The Research of Personal Privacy Information Security in the Era of Big Date; Neimenggu University: Huhehaote, China, 2018. [Google Scholar]
  11. Wu, J.Z.; Wu, Y.J.; Wu, Z.F.; Yang, M.T.; Luo, T.Y.; Wang, Y.J. An Android privacy leakage malicious application detection approach based on directed information flow. J. Univ. Chin. Acad. Sci. 2015, 32, 807–815. [Google Scholar]
  12. Jin, X.Q.; Lu, J.Q.; Li, L.C. Design of network anomaly detection and intrusion prevention system based on information entropy. Electron. Des. Eng. 2021, 29, 152–156. [Google Scholar]
  13. Zhang, Z.G.; Wang, X.J.; Li, G.; Yue, S.M. The Generation Method of Network Defense Strategy Combining with Attack Graph and Game Model. Netinfo Secur. 2021, 21, 1–9. [Google Scholar]
  14. Song, X.M. Research on Covert Channel Identification Methods Based on Semantic Information Flow; Jiangsu University: Zhenjiang, China, 2017. [Google Scholar]
  15. Yang, T. Research on Detection Methods of Communication Privacy Leakage of Smart Home System; Hebei University of Science and Technology: Shijiazhuang, China, 2020. [Google Scholar]
  16. Pan, C.J. Research on Private Information Disclosure Detection Method of Composite Services; Xidian University: Xi’an, China, 2019. [Google Scholar]
  17. Russo, A.; Lax, G.; Dromard, B.; Mezred, M. A System to Access Online Services with Minimal Personal Information Disclosure. Inf. Syst. Front. 2021. [Google Scholar] [CrossRef]
  18. Sun, C.G.; Zhu, W.Z.; Li, W.F.; He, X. A method for detecting privacy data leakage in Android application. J. Zhengzhou Univ. Sci. Ed. 2019, 52, 68–74. [Google Scholar]
  19. Peng, Y.C. Consideration and analysis of public information disclosure and personal information protection in epidemic response. Chin. J. Gen. Pract. 2021, 19, 1760–1763. [Google Scholar]
  20. Yang, A.; Liu, H.; Chen, Y.; Zhang, C.; Yang, K. Digital video intrusion intelligent detection method based on narrowband Internet of Things and its application. Image Vis. Comput. 2020, 97, 130914. [Google Scholar] [CrossRef]
  21. Chen, W.; Lv, W.Y.; Li, S.Q.; Dai, J.; Deng, X. Estimation and Comparison of Two Markov Chain State Transition Probability Matrices. J. Chongqing Univ. Technol. Nat. Sci. 2021, 35, 217–223. [Google Scholar]
  22. Jiang, L.; Liu, J.Y.; Wei, Z.B.; Gong, H.; Lei, C.; Li, C.X. Running State and Its Risk Evaluation of Transmission Line Based on Markov Chain Model. Autom. Electr. Power Syst. 2015, 39, 51–58. [Google Scholar]
  23. Song, L.J.; Xu, Z.Y. Assessment of power customer credit risk based on set pair analysis and Markov chain model. Electr. Power Autom. Equip. 2009, 29, 37–40. [Google Scholar]
  24. Pettai, M.; Laud, P. Combining differential privacy and secure multiparty computationl. In Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7–11 December 2015; pp. 421–430. [Google Scholar]
  25. Zhu, X.X.; Liu, X.Y.; Xiong, Q.Q. Research on the impact of App permissions on user privacy. Wirel. Internet Technol. 2021, 18, 13–18, 41. [Google Scholar]
Figure 1. The flow chart of the information flow detection.
Figure 1. The flow chart of the information flow detection.
Mathematics 10 02011 g001
Figure 2. The cloud platform-based big data computing environment.
Figure 2. The cloud platform-based big data computing environment.
Mathematics 10 02011 g002
Figure 3. The data leakage detection process of intelligent mobile devices.
Figure 3. The data leakage detection process of intelligent mobile devices.
Mathematics 10 02011 g003
Figure 4. The system permission mechanism.
Figure 4. The system permission mechanism.
Mathematics 10 02011 g004
Figure 5. The evaluation index relation diagram.
Figure 5. The evaluation index relation diagram.
Mathematics 10 02011 g005
Figure 6. The risk assessment results of the different types of equipment.
Figure 6. The risk assessment results of the different types of equipment.
Mathematics 10 02011 g006
Table 1. The risky application characterization table.
Table 1. The risky application characterization table.
Application ProgramRisky Application Characterization
MessageObtain the content of message, sending and receiving time and SMS records
ContactsObtain address book information
Instant MessagingObtain communication software information, such as WeChat record
BrowserObtain browser access history, tag data, etc.
Call LogObtain call record, call time, call frequency
Social NetworksObtain social app data, such as takeout data and likes
PositionObtain position information, motion trajectory
Table 2. A typical high-risk API source code.
Table 2. A typical high-risk API source code.
EventAPI Source Code
IMEILocal Telephone Manager.get Imei
Phone numberLocal Telephone Manager.get Phonenumber
SMS CenterGet SMS Center
Handled Value of String
Pid This M Pid
Install time Get first Start Time
Sys version Build VERSION.sdk
Table 3. The proportion of privacy rights.
Table 3. The proportion of privacy rights.
PermissionsApplication Rate
ACCESS_COARSE_LOCATION48.7%
ACCESS_FINE_LOCATION41.5%
GET_TASKS39.5%
CALL_PHONE12.1%
READ_SETINGS10%
READ_ACCOUNTS10%
GET_ACCOUNTS9%
SEND_SMS8%
RECEIVE_SMS8%
Table 4. The risk assessment index system of the data leakage of intelligent mobile devices.
Table 4. The risk assessment index system of the data leakage of intelligent mobile devices.
Primary IndexSecondary IndexPrimary IndexSecondary Index
Technical LevelIntrusion DetectionOperation ManagementAdvertising Review
Access ControlSupervision System
Network SecurityInsider Threats
Anonymous TechnologyThird Party Information Collection
Anomaly DetectionPosition Monitoring
Stain TrackingPrivacy Management
Identity AuthenticationSelf LevelPrivacy Awareness
Track HidingIntrusion Experience
Data SharingAssociation Settings
Data EncryptionPassword Settings
Environmental LevelData ExchangePermission Setting
Location ServicesData Identification
Advertising AttackTerminal LevelData Protection
Protocol CompatibilityData Control
Management RegulationsPermission Control
Privacy DiversityEvent Reminder
Table 5. The probability of different risk factors for the three mobile devices.
Table 5. The probability of different risk factors for the three mobile devices.
EquipmentFactorExpect95% Confidence IntervalProbabilityFactorExpect95% Confidence IntervalProbabilityFactorExpect95% Confidence IntervalProbabilityFactorExpect95% Confidence IntervalProbability
TabletPC X 1 4.13.2–5.60.027 X 7 8.07.2–9.30.052 X 13 3.22.4–4.00.021 X 19 8.88.3–9.60.058
X 2 4.33.5–4.80.028 X 8 8.07.0–9.20.052 X 14 4.33.5–5.30.028 X 20 8.27.5–9.00.054
X 3 4.63.6–5.20.030 X 9 3.92.8–5.00.026 X 15 9.18.0–9.50.060 X 21 7.56.6–8.40.049
X 4 4.52.9–6.00.029 X 10 4.22.7–5.50.027 X 16 9.27.8–9.30.060 X 22 6.15.5–7.00.040
X 5 7.15.5–8.70.046 X 11 3.52.8–4.00.023 X 17 9.28.0–9.70.060 X 23 7.85.0–9.30.051
X 6 7.16.3–7.50.046 X 12 4.53.5–5.50.029 X 18 9.69.0–100.063 X 24 5.94.8–7.30.039
Intelligent mobile phone X 1 4.23.1–5.80.031 X 7 5.74.5–6.80.042 X 13 6.85.6–7.50.050 X 19 9.26.8–9.80.067
X 2 7.56.8–8.50.055 X 8 5.84.5–7.80.042 X 14 4.73.5–6.40.034 X 20 3.12.0–4.20.023
X 3 4.83.0–6.50.035 X 9 3.93.0–5.20.029 X 15 4.03.3–5.00.029 X 21 6.54.3–8.00.048
X 4 3.93.0–6.40.029 X 10 4.22.8–6.40.031 X 16 8.77.3–9.60.064 X 22 5.54.0–6.80.040
X 5 4.12.5–6.50.030 X 11 4.72.5–6.20.034 X 17 8.87.5–9.30.064 X 23 7.86.3–8.50.057
X 6 4.02.4–7.00.029 X 12 3.82.0–6.70.028 X 18 9.28.5–9.60.067 X 24 5.94.3–7.50.043
Bracelet X 1 2.61.5–4.30.019 X 7 8.37.5–9.60.061 X 13 8.57.5–9.60.062 X 19 9.28.5–9.70.067
X 2 2.71.8–4.60.020 X 8 4.73.2–6.00.034 X 14 4.73.2–7.00.034 X 20 3.72.8–5.60.027
X 3 4.73.5–6.00.034 X 9 3.52.5–4.80.026 X 15 3.92.0–7.50.029 X 21 4.73.0–6.60.034
X 4 3.52.5–6.00.026 X 10 3.72.3–5.00.027 X 16 8.05.3–9.70.058 X 22 5.74.0–7.40.042
X 5 2.72.0–5.00.020 X 11 3.62.5–5.30.026 X 17 8.97.0–9.90.065 X 23 8.67.6–9.50.063
X 6 8.57.2–9.50.062 X 12 8.77.8–9.50.064 X 18 8.97.2–9.90.065 X 24 4.82.6–7.00.035
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yang, X.; Liu, Y.; Xie, J. Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics 2022, 10, 2011. https://doi.org/10.3390/math10122011

AMA Style

Yang X, Liu Y, Xie J. Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics. 2022; 10(12):2011. https://doi.org/10.3390/math10122011

Chicago/Turabian Style

Yang, Xiaolei, Yongshan Liu, and Jiabin Xie. 2022. "Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices" Mathematics 10, no. 12: 2011. https://doi.org/10.3390/math10122011

APA Style

Yang, X., Liu, Y., & Xie, J. (2022). Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics, 10(12), 2011. https://doi.org/10.3390/math10122011

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop