Skip to main content

A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps

  • Conference paper
  • First Online:
E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age (e-Democracy 2019)

Abstract

The Android unrestricted application market, being of open source nature, has made it a popular platform for third-party applications reaching millions of smart devices in the world. This tremendous increase in applications with an extensive API that includes access to phone hardware, settings, and user data raises concerns regarding users privacy, as the information collected from the apps could be used for profiling purposes. In this respect, this paper focuses on the geolocation data and analyses five GPS applications to identify the privacy risks if no appropriate safeguards are present. Our results show that GPS navigation apps have access to several types of device data, while they may allow for personal data leakage towards third parties such as library providers or tracking services without providing adequate or precise information to the users. Moreover, as they are using third-party libraries, they suffer from the intra-library collusion issue, that could be exploited from advertising and analytics companies through apps and gather large amount of personal information without the explicit consent of the user.

figure a

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement no. 786698. The work reflects only the authors’ view and the Agency is not responsible for any use that may be made of the information it contains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.haystack.mobi/.

  2. 2.

    https://repo.xposed.info.

  3. 3.

    https://mobilesecuritywiki.com/.

  4. 4.

    https://developer.android.com/about/dashboards.

References

  1. Alshammari, M., Simpson, A.: Towards a principled approach for engineering privacy by design. In: Schweighofer, E., Leitold, H., Mitrakas, A., Rannenberg, K. (eds.) APF 2017. LNCS, vol. 10518, pp. 161–177. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67280-9_9

    Chapter  Google Scholar 

  2. Android Developers, Permissions Overview. https://goo.gl/A7QG1J. Accessed 22 Jan 2019

  3. Athanasopoulos, E., Kemerlis, V.P., Portokalidis, G., Keromytis, A.D.: NaClDroid: native code isolation for android applications. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 422–439. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45744-4_21

    Chapter  Google Scholar 

  4. Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., Shadbolt, N.: Third Party Tracking in the Mobile Ecosystem. arXiv:1804.03603v3 [cs.CY] (2018)

  5. Bujlow, T., Carela-Español, V., Solé-Pareta, J., Barlet-Ros, P.: A survey on web tracking: mechanisms, implications, and defenses. Proc. IEEE 105, 1476–1510 (2017). https://doi.org/10.1109/jproc.2016.2637878

    Article  Google Scholar 

  6. Castelluccia, C.: Behavioural tracking on the internet: a technical perspective. In: Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (eds.) European Data Protection: In Good Health, pp. 21–33. Springer, Heidelberg (2012). https://doi.org/10.1007/978-94-007-2903-2_2

    Chapter  Google Scholar 

  7. Chatzistefanou, V., Limniotis, K.: On the (non-)anonymity of anonymous social networks. In: Katsikas, S.K., Zorkadis, V. (eds.) e-Democracy 2017. CCIS, vol. 792, pp. 153–168. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71117-1_11

    Chapter  Google Scholar 

  8. Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_1

    Chapter  Google Scholar 

  9. European Union Agency for Network and Information Security: Privacy and data protection in mobile applications - A study on the app development ecosystem and the technical implementation of GDPR (2017). https://doi.org/10.2824/114584

  10. Gervais, A., Filios, A., Lenders, V., Capkun, S.: Quantifying web adblocker privacy. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 21–42. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_2

    Chapter  Google Scholar 

  11. Grammatikakis, K.-P., Ioannou, A., Shiaeles, S., Kolokotronis, N.: Are cracked applications really free? An empirical analysis on Android devices. In: 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 730–735 (2018). https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00127

  12. GSM Association: Safety, privacy and security across the mobile ecosystem - Key issues and policy implications. https://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf (2017). Accessed 23 Dec 2018

  13. Ikram, M., Kaafar, M. A.: A first look at mobile Ad-Blocking apps. In IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1–8 (2017). https://doi.org/10.1109/NCA.2017.8171376

  14. Jesus, V., Mustare, S.: I did not accept that: demonstrating consent in online collection of personal data. In: Gritzalis, S., Weippl, E.R., Katsikas, S.K., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2019. LNCS, vol. 11711, pp. 33–45. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27813-7_3

    Chapter  Google Scholar 

  15. Krumm, J.: Ubiquitous advertising: the killer application for the 21st century. IEEE Pervasive Comput. 10, 66–73 (2010). https://doi.org/10.1109/mprv.2010.21

    Article  Google Scholar 

  16. Kurtz, A., Gascon, H., Becker, T., Rieck, K., Freiling. F.: Fingerprinting mobile devices using personalized configurations. In: Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 1, pp. 4–19 (2016). https://doi.org/10.1515/popets-2015-0027

    Article  Google Scholar 

  17. Razaghpanah, A., et al.: Apps, trackers, privacy, and regulators: a global study of the mobile tracking ecosystem. In: Network and Distributed System Security Symposium (2018)

    Google Scholar 

  18. Ren, J., Lindorfer, M., Dubois, D.J., Rao, A., Choffnes, D., Vallina-Rodriguez, N.: Bug fixes, improvements, ... and privacy leaks - a longitudinal study of PII leaks across android app versions. In: Network and Distributed System Security Symposium (2018). https://doi.org/10.14722/ndss.2018.23159

  19. Reyes, I., et al.: Is our children’s apps learning? Automatically detecting coppa violations. In: IEEE Workshop on Technology and Consumer Protection (ConPro) (2017)

    Google Scholar 

  20. Son, S., Kim, D., Shmatikov, V.: What mobile ads know about mobile users. In: Network and Distributed System Security Symposium (2016). https://doi.org/10.14722/ndss.2016.23407

  21. Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating user privacy in Android ad libraries. In: Workshop on Mobile Security Technologies (MoST), p. 10 (2012)

    Google Scholar 

  22. Taylor, V.F., Beresford, A.R., Martinovic, I.: Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones. arXiv:1708.03520v1 [cs.CR] (2017)

  23. Wang, W., Wang, X., Feng, W., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9, 1869–1882 (2014). https://doi.org/10.1109/TIFS.2014.2353996

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to thank Narseo Vallina-Rodriguez from the International Computer Science Institute (ICSI) in Berkeley for providing useful explanation on the Lumen tool’s monitoring process, as well as the anonymous reviewers for their useful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos Limniotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Monogios, S., Limniotis, K., Kolokotronis, N., Shiaeles, S. (2020). A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps. In: Katsikas, S., Zorkadis, V. (eds) E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. e-Democracy 2019. Communications in Computer and Information Science, vol 1111. Springer, Cham. https://doi.org/10.1007/978-3-030-37545-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37545-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37544-7

  • Online ISBN: 978-3-030-37545-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics