Skip to main content

Table 4 Privacy leakage via 3rd-libraries

From: DroidEcho: an in-depth dissection of malicious behaviors in Android applications

Library

Description

Num

Behaviors

Adobe

Measurement of Usage

1

Identity Code, etc.

Flurry

Measurement of Usage

20

Identity Code, Location, etc.

Conversant

Measurement of Usage

1

Identity Code, Location, etc.

Crashlytics

Diagnosis of Crash

8

Identity Code, Sys. Info, etc.

Map Service

Map Service

5

Location, etc.

Crittercism

Optimization Tool

1

Identify Code, etc.

Umeng

Advertisement

4

Identity Code, Location, etc.

Google Ads

Advertisement

3

Identity Code, Location, etc.

Amazon Ads

Advertisement

1

Identity Code, Locatoin, etc.

Millennialmedia

Advertisement

2

Identity Code, Location, etc.