BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Date iCal//NONSGML kigkonsult.se iCalcreator 2.20.4// METHOD:PUBLISH X-WR-CALNAME;VALUE=TEXT:ÌÇÐÄÔ­´´ BEGIN:VTIMEZONE TZID:America/New_York BEGIN:STANDARD DTSTART:20171105T020000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST END:STANDARD BEGIN:DAYLIGHT DTSTART:20180311T020000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT UID:calendar.250261.field_event_date.0@www.wright.edu DTSTAMP:20260219T215151Z CREATED:20171115T194027Z DESCRIPTION:Committee:  Drs. Junjie Zhang\, Advisor\, Adam Bryant\, and Yon g PeiABSTRACT:According to Google Android now runs on 1.4 billion devices. The growing popularity has attracted attackers to use Android as a platfo rm to conduct malicious activities. To accomplish these malicious activiti es\, some attackers prefer to develop malicious Apps to steal information from the Android users. As the modern day\, Android smartphones process a lot of sensitive information\, information security\, and privacy are beco ming potential targets for the attacker. The malicious Apps steal informat ion from the infected phone and send this information to malicious URLs us ing various Android sink functions. Therefore\, it necessary to protect da ta as it can prove detrimental if sensitive data of the user gets leaked t o the malicious attacker. In this thesis research\, we first discuss our s tatic taint analysis framework which is used to track sensitive informatio n flow from source to sink. We then study the relationship between the lea ked data and URLs involved in the information leakage. We tested our frame work over more than 2000 malicious samples to determine whether the sample s leak any sensitive information to any external suspicious URLs or any ot her information sinks. We found 30 percent of malware samples leaks variou s Android sensitive information to around 330 suspicious URLs. We then stu dy to derive associations between the leaked data and the suspicious URLs to gain more intelligence on information security and privacy threat from information leaking malware samples. We conclude our research by discussin g some interesting information leakage scenarios other than suspicious URL s. Our study also raises awareness in both network security and informatio n security domains where programmers fail to follow secure coding practice s. DTSTART;TZID=America/New_York:20171121T110000 DTEND;TZID=America/New_York:20171121T130000 LAST-MODIFIED:20171115T201202Z LOCATION:304 Russ Engineering Center SUMMARY:Masters Thesis Defense 'Detecting Information Leakage in Android Ma lware using Static Taint Analysis' By Soham Kelkar URL;TYPE=URI:/events/masters-thesis-defense-detecting -information-leakage-android-malware-using-static-taint END:VEVENT END:VCALENDAR