

IEEE Transactions on Information Forensics and Security 14, 3 (2018), 773-788. A multimodal deep learning method for Android Malware detection using various features. TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, and Eul Gyu Im.Platform privacies: Governance, collaboration, and the different meanings of "privacy" in iOS and Android development. Protecting contacts against privacy leaks in smartphones. A Survey on Various Threats and Current State of Security in Android Platform. Encryption | Android Open Source Project. Android 8.0 Behavior Changes | Android Developers. Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns. Mikhail Andreev, Avi Klausner, Trishita Tiwari, Ari Trachtenberg, and Arkady Yerukhimovich.We assess the user awareness and present a prototype zero-permission app that collects user data. In this work, we examine the issue of default access rights of Android apps and discuss the potential threat against user privacy. The device owner has no immediate way to control this flow of information and, even worse, may not even be aware that this type personal data flow can take place. Consequently, a honest but curious Android app may leverage the implicit access rights to accumulate such unguarded information pieces and gradually build a detailed profile of the user.

Similarly, any app has access to the clipboard which may occasionally contain very sensitive information, like a password. For example, any Android app has the right to get the device's network operator, which may be used to infer information about user's country and nationality. However, in Android, the access to certain assets is granted by default to the installed apps. Android apps can obtain access to specific data items by requesting the appropriate permissions from the user. These data are stored on the device and are protected by the Android permission scheme. Android devices contain a vast amount of personal data of their owners.
