Private Data Protection of Android Application

  • Jinseong Kim
  • Im Y. JungEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)


Many Android applications store sensitive information such as account information, debit/credit card details. The exposed information can be accessed by attackers. They can pretend to be the data owners in cyber space with a duplicate of the information. In this study, we propose a new framework to protect Android applications against the data duplication attack. The proposed framework is practical because it can be applied to all of Android applications and has an inconsiderable overhead contributing to security of Android.


Application data duplication Android Vulnerability 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2017R1D1A1B03034950)


  1. 1.
  2. 2.
    Joshi, J., Parekh, C.: Android smartphone vulnerabilities: a survey. In: International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), pp. 1–5. IEEE (2016)Google Scholar
  3. 3.
    Jung, J.H., et al.: Repackaging attack on android banking applications and its countermeasures. Wirel. Pers. Commun. 73(4), 1421–1437 (2013)CrossRefGoogle Scholar
  4. 4.
    Ardiansa, R.: Developing secure android application with encrypted database file using sqlcipher. PhD Thesis. UTeM (2014)Google Scholar
  5. 5.
    Kantar Worldpanel ComTech: THE TIME OF DOUBLEDIGIT GROWTH IS OVER. DEAL WITH IT, p. 4 (2016)Google Scholar
  6. 6.
    Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: Proceedings of the 36th International Conference on Software Engineering, pp. 175–186. ACM (2014)Google Scholar
  7. 7.
    Kim, J.; Jung, I.Y.: Android app protection using same identifier attack defensor. In: IEEE International Conference on Intelligence and Security Informatics (ISI) 2017, p. 201. IEEE (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Electronics EngineeringKyungpook National UniversityDaeguSouth Korea

Personalised recommendations