Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653691
|View full text |Cite
|
Sign up to set email alerts
|

On lightweight mobile phone application certification

Abstract: Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of applications results in a greater chance of installing Trojans and similar malware. In this paper, we propose the Kirin security service for Android, which performs lightweight certification of applications to mitigate malware at install time. Kirin certification uses security rules, which are templates designed to conservatively match und… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
451
0
7

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 754 publications
(467 citation statements)
references
References 24 publications
0
451
0
7
Order By: Relevance
“…Recently, the app's permission request pattern has been used to generate risk signal for warning potential malicious activities. Enck et al proposed a light weight application certification service called Kirin that uses a rule-based strategy to identify suspicious apps based on their requested permissions [16]. However, because the rules were defined manually, they can't adapt to the changing characteristics of current permissions and apps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, the app's permission request pattern has been used to generate risk signal for warning potential malicious activities. Enck et al proposed a light weight application certification service called Kirin that uses a rule-based strategy to identify suspicious apps based on their requested permissions [16]. However, because the rules were defined manually, they can't adapt to the changing characteristics of current permissions and apps.…”
Section: Related Workmentioning
confidence: 99%
“…A reliable risk signal should be triggered by as many malware as possible, and rarely be triggered by benign apps. We compare the performance of DroidRisk with two state-of-art methods: Kirin from [16], RCP and RCP + RP CP from [24] using 10-fold cross-validation. The risk signal for RCP is generated with rule #RCP (θ) ≥ 1 which is the simplest one in [24].…”
Section: Reliable Risk Signalmentioning
confidence: 99%
“…The work presented in [24] proposes a security framework that regulates the actions of Android apps defining security rules concerning permissions and sequence of operations. New rules can be added using a specification language.…”
Section: Related Workmentioning
confidence: 99%
“…On the downside, it does not give the installer the option of considering all requested permissions at once in order to detect suspicious or unwanted combinations. The latter is usually a reliable indicator of malicious apps [24,25]. We are unaware of any publication that investigates this type of interface in terms of privacy-related decisions.…”
Section: Alternative Interfacesmentioning
confidence: 99%