2012
DOI: 10.1007/978-3-642-35371-0_7
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-criteria-Based Evaluation of Android Applications

Abstract: Android users can face the risk of downloading and installing bad applications on their devices. In fact, many applications may either hide malware, or their expected behavior do not fully follow the user's expectation. This happens because, at install-time, even if the user is warned with the potential security threat of the application, she often skips this alert message. On Android this is due to the complexity of the permission system, which may be tricky to fully understand. We propose a multi-criteria ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…The other criteria (user rating, number of downloads and developer reputation) are extracted by parsing the market's web page. Upon computing the values for the five criteria, MAETROID implements AHP through Jama, the Java matrix package for matrix calculi 8 .…”
Section: Maetroid Implementation and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The other criteria (user rating, number of downloads and developer reputation) are extracted by parsing the market's web page. Upon computing the values for the five criteria, MAETROID implements AHP through Jama, the Java matrix package for matrix calculi 8 .…”
Section: Maetroid Implementation and Resultsmentioning
confidence: 99%
“…Hence, a malicious app can cause a consistent financial damage to the user, e.g., by issuing calls to premium numbers which are likely to pass unnoticed (at least until the user credit ends or the user receives the bill). Table A.7 in Appendix A gives an excerpt of the threat scores we have assigned to all the Android permissions (we refer the reader to [16] for a full list). In Table A.7, acronyms PT, ST, and FT are an abbreviation of privacy, system, and financial threat, respectively.…”
Section: Threat Scorementioning
confidence: 99%
See 1 more Smart Citation
“…Among the protection mechanisms, as we did for mobile applications [6], we plan to develop ratings for Facebook applications based on the privileges those asks (see also [7]) hence helping users to make informed decisions. Eventually, our goal is to enhance Phook with data control mechanisms and policies that can empower the user with a complete, understandable and predictable control of their data.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we propose MAETROID (Mobile Application Evaluator of TRust for andrOID), a framework for evaluating the level of trust of Android applications, which extends the framework proposed in [3]. This previous framework estimates the level of trust for an application using static analysis only.…”
Section: Introductionmentioning
confidence: 97%