2014
DOI: 10.1016/j.future.2013.09.014
|View full text |Cite
|
Sign up to set email alerts
|

Mining permission patterns for contrasting clean and malicious android applications

Abstract: Android application uses permission system to regulate the access to system resources and users' privacy-relevant information. Existing work have demonstrated several techniques to study the required permissions declared by the developers, but few attention has been paid for used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(39 citation statements)
references
References 23 publications
0
37
0
2
Order By: Relevance
“…However, according to Moonsamy et al [24], there are requested permissions as well as required permissions. It is possible that actual permissions used by applications are different from the requested permissions that is sent to the user for approval.…”
Section: Data Collection and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…However, according to Moonsamy et al [24], there are requested permissions as well as required permissions. It is possible that actual permissions used by applications are different from the requested permissions that is sent to the user for approval.…”
Section: Data Collection and Analysismentioning
confidence: 99%
“…Numerous studies simply extracted permissions and utilized machine learning to detect malicious application, [45], [46], [47], [48]. Researchers in [49], [50] argue that merely analyzing requested permissions is not sufficient for detecting malicious applications. They analyzed used permissions in addition to requested permissions in order to detect malware.…”
Section: Effectivenessmentioning
confidence: 99%
“…It is worth noted that a mix of variety static features types was used in the studied works. For example, in some works, a mapping between API calls and requested permissions has been used to avoid permission-over privileged such as in [93,94]. Moreover, in [95], the permissions have been used with some app metadata like app's price, a number of downloads, user rating, and app description to distinguish the benign form malware apps.…”
Section: Semantic Featuresmentioning
confidence: 99%
“…Generally, the benign-ware dataset in most of the studied works such as [33,51,54,61,67,71,[85][86][87][88][89]125] was collected from the official Android app market (Google Play). In some other works, the benign dataset has been collected from the third-party markets such as in [49,94,126,127]. And in some other works, a benign dataset that includes apps from each of the official and third-party markets has been used such as in [50,128,129].…”
Section: Benign Datasetmentioning
confidence: 99%
“…Moonsamy ve ark. [8] izinlere teker teker bakmak yerine birlikte kullanımlarına göre gruplamaya çalışmış, ve bu yaklaşım üzerinden tespit için algoritma geliştirmişlerdir.…”
Section: öNceki̇ çAlişmalarunclassified