You are not logged in.

Mining permission patterns for contrasting clean and malicious android applications

Moonsamy,V, Rong,J and Liu,S 2014, Mining permission patterns for contrasting clean and malicious android applications, Future generation computer systems, vol. 36, pp. 122-132, doi: 10.1016/j.future.2013.09.014.

Attached Files
Name Description MIMEType Size Downloads

Title Mining permission patterns for contrasting clean and malicious android applications
Author(s) Moonsamy,V
Journal name Future generation computer systems
Volume number 36
Start page 122
End page 132
Publisher Elsevier BV
Place of publication Amsterdam, Netherlands
Publication date 2014-07
ISSN 0167-739X
Keyword(s) Android permission
Contrast mining
Data mining
Permission pattern
Science & Technology
Computer Science, Theory & Methods
Computer Science
Summary An Android application uses a permission system to regulate the access to system resources and users' privacy-relevant information. Existing works have demonstrated several techniques to study the required permissions declared by the developers, but little attention has been paid towards used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. A benchmark malware dataset and a dataset of 1227 clean applications has been collected by us to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns. © 2013 Elsevier B.V. All rights reserved.
Language eng
DOI 10.1016/j.future.2013.09.014
Field of Research 080503 Networking and Communications
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2014, Elsevier BV
Persistent URL

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 17 times in TR Web of Science
Scopus Citation Count Cited 26 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 135 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Tue, 31 Mar 2015, 11:54:14 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact