Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network

作者: Shancang Li , Theo Tryfonas , Gordon Russell , Panagiotis Andriotis

DOI: 10.1109/TCYB.2016.2537649

关键词:

摘要: Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate with devastating impact. When assessing the overall security mobile system, it is important assess risks posed by each applications (apps), thus gaining stronger understanding any present. This paper aims at developing three-layer framework assesses potential which apps introduce within Android systems. A Bayesian risk graphical model proposed evaluate propagation in layered architecture. By integrating static analysis, dynamic behavior analysis hierarchical framework, their through layer well modeled graph, quantitatively analyze faced both The graph offers novel way investigate environment enables users administrators risks. strategy allows strengthen app as entire system.

参考文章(28)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Exposing Security Risks for Commercial Mobile Devices Lecture Notes in Computer Science. pp. 3- 21 ,(2012) , 10.1007/978-3-642-33704-8_2
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang, A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data IEEE Transactions on Parallel and Distributed Systems. ,vol. 27, pp. 340- 352 ,(2016) , 10.1109/TPDS.2015.2401003
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Naser Peiravian, Xingquan Zhu, Machine Learning for Android Malware Detection Using Permission and API Calls international conference on tools with artificial intelligence. pp. 300- 305 ,(2013) , 10.1109/ICTAI.2013.53
Desheng Dash Wu, Cuicui Luo, David L. Olson, Efficiency Evaluation for Supply Chains Using Maximin Decision Support systems man and cybernetics. ,vol. 44, pp. 1088- 1097 ,(2014) , 10.1109/TSMC.2013.2291215
Erika Chin, Adrienne Porter Felt, Vyas Sekar, David Wagner, Measuring user confidence in smartphone security and privacy symposium on usable privacy and security. pp. 1- ,(2012) , 10.1145/2335356.2335358
Li Da Xu, Wu He, Shancang Li, Internet of Things in Industries: A Survey IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 2233- 2243 ,(2014) , 10.1109/TII.2014.2300753
Desheng Dash Wu, Selling to the Socially Interactive Consumer: Order More or Less? systems man and cybernetics. ,vol. 45, pp. 399- 410 ,(2015) , 10.1109/TSMC.2014.2373816
Jian Li, Xiaolong Li, Bin Yang, Xingming Sun, Segmentation-Based Image Copy-Move Forgery Detection Scheme IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 507- 518 ,(2015) , 10.1109/TIFS.2014.2381872