A Multi-criteria-Based Evaluation of Android Applications

作者: Gianluca Dini , Fabio Martinelli , Ilaria Matteucci , Marinella Petrocchi , Andrea Saracino

DOI: 10.1007/978-3-642-35371-0_7

关键词:

摘要: Android users can face the risk of downloading and installing bad applications on their devices. In fact, many may either hide malware, or expected behavior do not fully follow user’s expectation. This happens because, at install-time, even if user is warned with potential security threat application, she often skips this alert message. On due to complexity permission system, which be tricky understand.

参考文章(18)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh, Taming information-stealing smartphone applications (on Android) trust and trustworthy computing. pp. 93- 107 ,(2011) , 10.1007/978-3-642-21599-5_7
Joseph Migga Kizza, Computer Network Security ,(2005)
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry, Practical and lightweight domain isolation on Android Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 51- 62 ,(2011) , 10.1145/2046614.2046624
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Thomas L Saaty, A Scaling Method for Priorities in Hierarchical Structures Journal of Mathematical Psychology. ,vol. 15, pp. 234- 281 ,(1977) , 10.1016/0022-2496(77)90033-5
Thomas L. Saaty, Decision-making with the AHP: Why is the principal eigenvector necessary European Journal of Operational Research. ,vol. 145, pp. 85- 91 ,(2003) , 10.1016/S0377-2217(02)00227-8
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Thomas L. Saaty, DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS International Journal of Services Sciences. ,vol. 1, pp. 83- 98 ,(2008) , 10.1504/IJSSCI.2008.017590