File(s) under permanent embargo
Contrasting permission patterns between clean and malicious android applications
chapter
posted on 2013-01-01, 00:00 authored by Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang LiGang Li, Lynn BattenLynn BattenThe Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications.
History
Title of book
Security and privacy in communication networksSeries
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; v.127Chapter number
5Pagination
69 - 85Publisher
Springer International PublishingPlace of publication
Berlin, GermanyPublisher DOI
ISBN-13
9783319042831ISBN-10
3319042831Language
engNotes
This paper was presented at the International Conference on Security and Privacy in Communication Networks (9th : 2013 : Sydney, NSW)Publication classification
B1 Book chapter; B Book chapterCopyright notice
2013, SpringerExtent
26Editor/Contributor(s)
T Zia, A Zomaya, V Varadharajan, M MaoUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC