Risky model of mobile application presentation

The development of the information space has led to a situation where a digital portrait of a user becomes one of the most popular products. The ability to create a high-quality user profile is provided by the modern capabilities of computing systems in combination with methods of intellectual analy...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Computer Virology and Hacking Techniques 2023-09, Vol.19 (3), p.419-441
Hauptverfasser: Izergin, Dmitriy, Eremeev, Mikhail, Magomedov, Shamil
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The development of the information space has led to a situation where a digital portrait of a user becomes one of the most popular products. The ability to create a high-quality user profile is provided by the modern capabilities of computing systems in combination with methods of intellectual analysis and the availability of large data sets. Mass profiling by various services simultaneously solves the opposite problem—user identification based on traffic analysis and device telemetry, which leads to an increase in the quality of the user profile. In the conditions of large volumes of transmitted data and the progressive number of services providing digital services, the issues of ensuring the safety of user information are becoming the most critical for mobile platforms. Modern requirements for data security mechanisms are formed based on the analysis of system states and are aimed at neutralization of possible malicious effects, without taking into account the possibility of compromising the person by legitimate services or a set of services. In this article, a risky model of application presentation is proposed, aimed at obtaining knowledge about possible channels for compromising personal data by mobile applications for Android 11 OS, however, the developed model can be mostly applied to both other versions of Android and iOS. The presentation model contains 17 features that are used to form a digital portrait of the application. The scientific novelty of the presented model consists in taking into account the methods of software implementation of access to personal data and interaction with the remote infrastructure of the service in order to counteract the compromise of personal data by mobile applications. The set of data studied amounted to more than 150,000 executable files. The results presented in the article are intended for further intellectual analysis, which makes it possible to analyze the degree of compliance of the studied sample with general models of various categories.
ISSN:2263-8733
2263-8733
DOI:10.1007/s11416-023-00461-6