APK Auditor: Permission-based Android malware detection system

作者: Kabakus Abdullah Talha , Dogru Ibrahim Alper , Cetin Aydin

DOI: 10.1016/J.DIIN.2015.01.001

关键词: Mobile malwareComputer scienceStatic analysisInstallationPermissionAuditAndroid malwareMalwareComputer securityAndroid (operating system)

摘要: … file (AndroidManifest.xml), compiled Java classes and application resources. We have developed an Android malware detection system based on permission analysis through APK files…

参考文章(34)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Timothy Vidas, Nicolas Christin, Daniel Votipka, All your droid are belong to us: a survey of current android attacks WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 10- 10 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Yihao Zhang, Mehmet A. Orgun, Rohan Baxter, Weiqiang Lin, An application of element oriented analysis based credit scoring international conference on data mining. pp. 544- 557 ,(2010) , 10.1007/978-3-642-14400-4_42
Amadeo José Arguelles-Cruz, Itzamá López-Yáñez, Mario Aldape-Pérez, Napoleón Conde-Gaxiola, Alpha-Beta Weightless Neural Networks iberoamerican congress on pattern recognition. pp. 496- 503 ,(2008) , 10.1007/978-3-540-85920-8_61
Jussipekka Leiwo, Thomas Aura, Pekka Nikander, Towards Network Denial of Service Resistant Protocols information security. pp. 301- 310 ,(2000) , 10.1007/978-0-387-35515-3_31
Alaa M. Elsayad, Sahar A. Mokhtar, Predicting the Severity of Breast Masses with Data Mining Methods arXiv: Learning. ,(2013)
Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, Norman Sadeh, When are users comfortable sharing locations with advertisers? Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11. pp. 2449- 2452 ,(2011) , 10.1145/1978942.1979299
Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, Jinghai Rao, None, Understanding and capturing people's privacy policies in a mobile social networking application ubiquitous computing. ,vol. 13, pp. 401- 412 ,(2009) , 10.1007/S00779-008-0214-3