Attention! Your Copied Data is Under Monitoring : A Systematic Study of Clipboard Usage in Android Apps
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | ICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software |
Publisher | Association for Computing Machinery |
Number of pages | 13 |
ISBN (print) | 979-8-4007-0217-4 |
Publication status | Published - Feb 2024 |
Conference
Title | 46th IEEE/ACM International Conference on Software Engineering (ICSE 2024) |
---|---|
Location | Centro Cultural de Belém |
Place | Portugal |
City | Lisbon |
Period | 14 - 20 April 2024 |
Link(s)
Abstract
Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However, insufficient access control on the clipboard in the mobile operating systems exposes its contained data to high risks where one app can read the data copied in other apps and store it locally or even send it to remote servers. Unfortunately, the literature only has ad-hoc studies in this respect and lacks a comprehensive and systematic study of the entire mobile app ecosystem. To establish the missing links, this paper proposes an automated tool, ClipboardScope, that leverages the principled static program analysis to uncover the clipboard data usage in mobile apps at scale by defining a usage as a combination of two aspects, i.e., how the clipboard data is validated and where does it go. It defines four primary categories of clipboard data operation, namely spot-on, grand-slam, selective, and cherry-pick, based on the clipboard usage in an app. ClipboardScope is evaluated on 26,201 out of a total of 2.2 million mobile apps available on Google Play as of June 2022 that access and process the clipboard text. It identifies 23,948, 848, 1,075, and 330 apps that are recognized as the four designated categories, respectively. In addition, we uncovered a prevalent programming habit of using the SharedPreferences object to store historical data, which can become an unnoticeable privacy leakage channel. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.
Research Area(s)
- Program analysis
Bibliographic Note
Research Unit(s) information for this publication is provided by the author(s) concerned.
Citation Format(s)
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. / Chen, Yongliang; Tang, Ruoqin; Zuo, Chaoshun et al.
ICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software . Association for Computing Machinery, 2024. 63.
ICSE '24: Proceedings of the 46th IEEE/ACM International Conference on Software . Association for Computing Machinery, 2024. 63.
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review