Attention! Your Copied Data is Under Monitoring : A Systematic Study of Clipboard Usage in Android Apps

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

View graph of relations

Author(s)

  • Chaoshun Zuo
  • Xiaokuan Zhang
  • Lei Xue
  • Xiapu Luo

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software
PublisherAssociation for Computing Machinery
Number of pages13
ISBN (print)979-8-4007-0217-4
Publication statusPublished - Feb 2024

Conference

Title46th IEEE/ACM International Conference on Software Engineering (ICSE 2024)
LocationCentro Cultural de Belém
PlacePortugal
CityLisbon
Period14 - 20 April 2024

Abstract

Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However, insufficient access control on the clipboard in the mobile operating systems exposes its contained data to high risks where one app can read the data copied in other apps and store it locally or even send it to remote servers. Unfortunately, the literature only has ad-hoc studies in this respect and lacks a comprehensive and systematic study of the entire mobile app ecosystem. To establish the missing links, this paper proposes an automated tool, ClipboardScope, that leverages the principled static program analysis to uncover the clipboard data usage in mobile apps at scale by defining a usage as a combination of two aspects, i.e., how the clipboard data is validated and where does it go. It defines four primary categories of clipboard data operation, namely spot-on, grand-slam, selective, and cherry-pick, based on the clipboard usage in an app. ClipboardScope is evaluated on 26,201 out of a total of 2.2 million mobile apps available on Google Play as of June 2022 that access and process the clipboard text. It identifies 23,948, 848, 1,075, and 330 apps that are recognized as the four designated categories, respectively. In addition, we uncovered a prevalent programming habit of using the SharedPreferences object to store historical data, which can become an unnoticeable privacy leakage channel. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.

Research Area(s)

  • Program analysis

Bibliographic Note

Research Unit(s) information for this publication is provided by the author(s) concerned.

Citation Format(s)

Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. / Chen, Yongliang; Tang, Ruoqin; Zuo, Chaoshun et al.
ICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software . Association for Computing Machinery, 2024. 63.

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review