2019
DOI: 10.1111/exsy.12468
|View full text |Cite
|
Sign up to set email alerts
|

Android application behavioural analysis for data leakage

Abstract: An android application requires specific permissions from the user to access the system resources and perform required functionalities. Recently, the android market has experienced exponential growth, which leads to malware applications. These applications are purposefully developed by hackers to access private data of the users and adversely affect the application usability. A suitable tool to detect malware is urgently needed, as malware may harm the user. As both malware and clean applications require simil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 37 publications
0
14
0
Order By: Relevance
“…These objects are applied for covert channels with the Android's middleware layer bypass. At last, the measurement demonstrates that the low throughput of covert channels is appropriate to exchange private data 38,57 …”
Section: Attack Of Permission Escalationmentioning
confidence: 99%
See 1 more Smart Citation
“…These objects are applied for covert channels with the Android's middleware layer bypass. At last, the measurement demonstrates that the low throughput of covert channels is appropriate to exchange private data 38,57 …”
Section: Attack Of Permission Escalationmentioning
confidence: 99%
“…At last, the measurement demonstrates that the low throughput of covert channels is appropriate to exchange private data. 38,57…”
Section: Attack Of Permission Escalationmentioning
confidence: 99%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…Sharma and Gupta [31] proposed a novel approach, RNPDroid, to categorize the risks into four levels, i.e., high, medium, low, and none. Furthermore, Shrivastava and Kumar [32] proposed an algorithm that combines permission vectors to identify benign and malware app permissions, and conducted a systematic literature survey on permission-based malware detection [33], which provide useful guidance for the malware and benign permissions requirement.…”
Section: A Permission Rationales and Privacy Securitymentioning
confidence: 99%