Contrasting permission patterns between clean and malicious android applications

Moonsamy, Veelasha, Rong, Jia, Liu, Shaowu, Li, Gang and Batten, Lynn 2013, Contrasting permission patterns between clean and malicious android applications. In Zia, Tanveer, Zomaya, Albert, Varadharajan, Vijay and Mao, Morley (ed), Security and privacy in communication networks, Springer International Publishing, Berlin, Germany, pp.69-85, doi: 10.1007/978-3-319-04283-1_5.

Attached Files
Name Description MIMEType Size Downloads

Title Contrasting permission patterns between clean and malicious android applications
Author(s) Moonsamy, Veelasha
Rong, Jia
Liu, Shaowu
Li, GangORCID iD for Li, Gang
Batten, LynnORCID iD for Batten, Lynn
Title of book Security and privacy in communication networks
Editor(s) Zia, Tanveer
Zomaya, Albert
Varadharajan, Vijay
Mao, Morley
Publication date 2013
Series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; v.127
Chapter number 5
Total chapters 26
Start page 69
End page 85
Total pages 17
Publisher Springer International Publishing
Place of Publication Berlin, Germany
Keyword(s) android permission
malware detection
contrast mining
permission pattern
Summary The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications.
Notes This paper was presented at the International Conference on Security and Privacy in Communication Networks (9th : 2013 : Sydney, NSW)
ISBN 3319042831
Language eng
DOI 10.1007/978-3-319-04283-1_5
Field of Research 080503 Networking and Communications
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
HERDC collection year 2013
Copyright notice ©2013, Springer
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 5 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 737 Abstract Views, 14 File Downloads  -  Detailed Statistics
Created: Thu, 20 Feb 2014, 11:09:14 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact