Techniques to detect data leakage in mobile applications Online publication date: Wed, 07-Aug-2019
by Thiago Rocha; Eduardo Souto; Khalil El-Khatib
International Journal of Security and Networks (IJSN), Vol. 14, No. 3, 2019
Abstract: The popularity of mobile devices has skyrocketed over the past few years and has consequently given rise to various attacks in mobile platforms. The most serious among these threats is data leakage as most devices store sensitive information about their users, including location, bank information, to list a few. There have been a large number of data leakage detection proposals for mobile platforms, and a number of researches have looked at specific aspects of the mobile environment and used several techniques to provide protection. This survey provides an analysis of the data leakage problem, explains what it is, what kind of data it can expose, and the main techniques that have been used to circumvent this problem. It also looks at these various individual efforts and grouped them into categories. We also discuss the strengths and shortcomings of these efforts. Finally, some future works and opportunities of research are presented.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com