Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
نویسندگان
چکیده
منابع مشابه
Mining permission patterns for contrasting clean and malicious android applications
Android application uses permission system to regulate the access to system resources and users’ privacy-relevant information. Existing work have demonstrated several techniques to study the required permissions declared by the developers, but few attention has been paid for used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fil...
متن کاملAutomatic detection of inter-application permission leaks in Android applications
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user information. To better protect this information, modern mobile operating systems provide permission-based security, which restricts applications to only access a clearly defined subset of system APIs and user data. The Android operating system builds upon already successful permission systems, but com...
متن کاملContrasting Permission Patterns between Clean and Malicious Android Applications
The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed...
متن کاملAnalysis and Detection of Malicious Behaviors in Repackaged Android Applications
Context Over the past decades malware authorship grew to become a profession. Nowadays, there exists a plethora of malware instances that span various targets, structures, motivations, and objectives [1]. Despite the different objectives they pursue, the majority of malware authors strive to prolong the period of time their instances remain operational within the infected system. In this contex...
متن کاملPermission-Based Android Malware Detection
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2014
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2014.2353996