Instance based security risk value estimation for Android applications

作者: Mahmood Deypir , Abbas Horri

DOI: 10.1016/J.JISA.2018.02.002

关键词:

摘要: Abstract Android has emerged as the widest-used operating system for smartphones and mobile devices. Security of this platform mainly relies on applications (apps) installed by device owner since permissions sandboxing have reduced attack surface. antivirus programs detect known malware based their signature, but they cannot zero-day viruses. Therefore, estimating security risk could be helpful comparing selecting apps that are more likely to malicious or benign estimated values. systematic assistance making appropriate decisions can significantly improve Android-based Additionally, markets leverage risks recognize suspicious further analysis. In study, a new metric is introduced effective estimation untrusted apps. While previously proposed measurements features such function calls, our devised benefits from non-malicious app instances. The uses identified normal samples compute Thus, represented in feature space, each input app, using distances Moreover, increase metric's detection rate, an instance weighting schema suggested. Empirical evaluations various datasets show instance-based higher rates than score measurements.

参考文章(37)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Suleiman Y. Yerima, Sakir Sezer, Igor Muttik, Android malware detection: An eigenspace analysis approach science and information conference. pp. 1236- 1242 ,(2015) , 10.1109/SAI.2015.7237302
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
Anthony Desnos, Android: Static Analysis Using Similarity Distance hawaii international conference on system sciences. pp. 5394- 5403 ,(2012) , 10.1109/HICSS.2012.114
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Dimitris Geneiatakis, Igor Nai Fovino, Ioannis Kounelis, Pasquale Stirparo, A Permission verification approach for android mobile applications Computers & Security. ,vol. 49, pp. 192- 205 ,(2015) , 10.1016/J.COSE.2014.10.005
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691