Skip to main content

Table 4 Privacy leakage via 3rd-libraries

From: DroidEcho: an in-depth dissection of malicious behaviors in Android applications

Library Description Num Behaviors
Adobe Measurement of Usage 1 Identity Code, etc.
Flurry Measurement of Usage 20 Identity Code, Location, etc.
Conversant Measurement of Usage 1 Identity Code, Location, etc.
Crashlytics Diagnosis of Crash 8 Identity Code, Sys. Info, etc.
Map Service Map Service 5 Location, etc.
Crittercism Optimization Tool 1 Identify Code, etc.
Umeng Advertisement 4 Identity Code, Location, etc.
Google Ads Advertisement 3 Identity Code, Location, etc.
Amazon Ads Advertisement 1 Identity Code, Locatoin, etc.
Millennialmedia Advertisement 2 Identity Code, Location, etc.