Mining permission patterns for contrasting clean and malicious android applications
Version 2 2024-06-06, 05:42Version 2 2024-06-06, 05:42
Version 1 2015-03-31, 12:52Version 1 2015-03-31, 12:52
journal contribution
posted on 2024-06-06, 05:42 authored by V Moonsamy, J Rong, S LiuAn Android application uses a permission system to regulate the access to system resources and users' privacy-relevant information. Existing works have demonstrated several techniques to study the required permissions declared by the developers, but little attention has been paid towards used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. A benchmark malware dataset and a dataset of 1227 clean applications has been collected by us to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns. © 2013 Elsevier B.V. All rights reserved.
History
Journal
Future generation computer systemsVolume
36Pagination
122-132Location
Amsterdam, NetherlandsISSN
0167-739XeISSN
1872-7115Language
engPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2014, Elsevier BVPublisher
Elsevier BVUsage metrics
Categories
Keywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC