Contrasting Permission Patterns between Clean and Malicious Android Applications

作者: Veelasha Moonsamy , Jia Rong , Shaowu Liu , Gang Li , Lynn Batten

DOI: 10.1007/978-3-319-04283-1_5

关键词: MalwarePrivate information retrievalAndroid (operating system)Computer sciencePermission systemComputer securityPermission

摘要: The Android platform uses a permission system model to allow users and developers regulate access private information resources required by applications. Permissions have been proved be useful for inferring behaviors characteristics of an application. In this paper, novel method extract contrasting patterns clean malicious applications is proposed. Contrary existing work, both used permissions were considered when discovering the patterns. We evaluated our methodology on malware dataset, each comprising 1227 Our empirical results suggest that can capture key differences between applications, which assist in characterizing these two types

参考文章(18)
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Rob Law, Jia Rong, Huy Quan Vu, Gang Li, Hee Andy Lee, Identifying changes and trends in Hong Kong outbound tourism Tourism Management. ,vol. 32, pp. 1106- 1114 ,(2011) , 10.1016/J.TOURMAN.2010.09.011
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Mario Frank, Ben Dong, Adrienne Porter Felt, Dawn Song, Mining Permission Request Patterns from Android and Facebook Applications 2012 IEEE 12th International Conference on Data Mining. pp. 870- 875 ,(2012) , 10.1109/ICDM.2012.86
Shaowu Liu, Rob Law, Jia Rong, Gang Li, John Hall, Analyzing changes in hotel customers’ expectations by trip mode International Journal of Hospitality Management. ,vol. 34, pp. 359- 371 ,(2013) , 10.1016/J.IJHM.2012.11.011
Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus, Automatically securing permission-based software by reducing the attack surface: an application to Android Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012. pp. 274- 277 ,(2012) , 10.1145/2351676.2351722
Justin Sahs, Latifur Khan, A Machine Learning Approach to Android Malware Detection european intelligence and security informatics conference. pp. 141- 147 ,(2012) , 10.1109/EISIC.2012.34