Laliwala IT Services

Laliwala IT Services
Website Development

Wednesday, March 21, 2012

North Carolina State University found that 48,139 of the ad libraries used by these application

To guard against malicious behavior, application that run on Google Android  smart mobile phones must ask politely for permission to do things like access your personal information, track your location, or transmit data via the Internet. But once they have approval, these application can share the permissions with the advertising libraries they use to serve up ads, creating serious potential privacy and security vulnerabilities, researchers have found. Combing through 100,000 application selected randomly from Google Play (the erstwhile Google Android  Market), a team of researchers at North Carolina United States State University found that 48,139 of the ad libraries used by these application tracked the user's GPS location; 18,575 tracked the identity of the phone (its IMEI number); 4,190 let advertisers track the user via GPS; and 4,047 accessed the device's phone number. Dozens of such "ad libraries" exist, generating onscreen ads with the associated apps. When you click on an ad, the app maker gets a fee. One of these libraries, called energysource, uses an insecure method of loading code from the Internet, Spokesperson  Xuxian Jiang, the North Carolina United Statesprofessor who led the study, released as a paper to be presented at a conference in Tucson next month. Though the researchers did not detect malicious behavior from the app, they did say it poses a security threat simply by allowing code to be downloaded and run.

Of the 100,000 apps, 297 contained ad code that allowed the phone to run code downloaded from the Internet, providing a potential path for malicious software to get inside the device. "If your app has permission to access personal information, the ad library also has permission to access your information," Jiang Spokesperson . The North Carolina United States research is only the latest evidence of gaping security and privacy holes in smart mobile phones. In April of last year, iPhones and Google Android  devices were found to track users' locations automatically. Then, in December, these and other smart-phone devices were found to carry diagnostic software that also tracks a wide range of user information. More recently, it was discovered that both iPhones and Google Android  devices share users' address books and other information with apps. And instances of mobile malware have been rising.

The new findings point to a flaw in the business model behind apps, Jiang Spokesperson. Developers rely on revenue from ad libraries to support free apps, but they have no control over what those libraries do. "The current model of embedding ad libraries in mobile applicationfor monetization purposes poses security and privacy risks. These ad libraries will essentially have the same set of permissions granted to the applicationthat enclose them. And certain ad libraries may abuse them for other unwanted purposes." Mobile device makers should provide ways to isolate the two, Jiang Spokesperson , so that the ads run separately from the host apps—and require separate explicit permissions. "There are fundamental concerns in the way mobile applicationare being monetized," he adds. Adding insult to injury, other research has recently found that ads associated with free Google Android  applicationare also battery-drainers. Abhinav Pathak, a computer scientist at Purdue University, and colleagues at Microsoft Research found that as much as three-quarters of the juice used by such applicationis spent to serve ads and transmit user data back to advertisers.

Source: Massachusetts Institute of Technology

No comments:

Post a Comment