Another free app: Does it have the right intentions?

作者: Mohamed Fazeen , Ram Dantu

DOI: 10.1109/PST.2014.6890950

关键词: Android (operating system)MalwarePermissionComputer securityComputer scienceFeature extractionSource codeStatic program analysisArtificial intelligenceUnsupervised learningMobile deviceMachine learning

摘要: Security and privacy holds a great importance in mobile devices due to the escalated use of smart phone applications (app). This has made user even more vulnerable malicious attacks than ever before. We aim address this problem by proposing novel framework identify potential Android malware apps extracting intention their permission requests. First, we constructed dataset consisting 1,730 benign along with 273 samples. Then, both datasets were subjected source code extraction. From there on, followed two phase approach In 1, machine learning model group into different clusters based on operations known as task-intention. Once trained model, it was used task-intention an app. Further, phase, only construct task-intentions none signatures involved. Therefore, our does not models apps. for each group, extracted permission-requests probability mass functions (PMF). named shape PMF Intention-Shape or I-Shape. 2, permission-requests, I-Shapes compared unknown app its corresponding I-Shape Using approach, obtained accuracy 89% detecting The novelty work is perform identification without training any signatures, utilization such Our can be utilized safety before installed performs static analysis. pre-screening multi-layer security systems. It also highly useful screening when launching markets.

参考文章(14)
Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci, Combining supervised and unsupervised learning for zero-day malware detection 2013 Proceedings IEEE INFOCOM. pp. 2022- 2030 ,(2013) , 10.1109/INFCOM.2013.6567003
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, On the automatic categorisation of android applications consumer communications and networking conference. pp. 149- 153 ,(2012) , 10.1109/CCNC.2012.6181075
Roberto Perdisci, ManChon U, VAMO Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 329- 338 ,(2012) , 10.1145/2420950.2420999
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio, A Classifier of Malicious Android Applications availability, reliability and security. pp. 607- 614 ,(2013) , 10.1109/ARES.2013.80
Ittipon Rassameeroj, Yuzuru Tanahashi, Various approaches in analyzing Android applications with its permission-based security models electro information technology. pp. 1- 6 ,(2011) , 10.1109/EIT.2011.5978583
Vaibhav Rastogi, Yan Chen, Xuxian Jiang, Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 99- 108 ,(2014) , 10.1109/TIFS.2013.2290431
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, Permission evolution in the Android ecosystem Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 31- 40 ,(2012) , 10.1145/2420950.2420956
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno Stephan, Joachim M. Buhmann, The Balanced Accuracy and Its Posterior Distribution international conference on pattern recognition. pp. 3121- 3124 ,(2010) , 10.1109/ICPR.2010.764
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779