2021
DOI: 10.1155/2021/6689486
|View full text |Cite
|
Sign up to set email alerts
|

Permission Sensitivity-Based Malicious Application Detection for Android

Abstract: Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(5 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…With the further development of federated learning, issues related to federated learning privacy protection have gradually attracted people's attention. Among them, secure multi-party computing [5] was first introduced as a means. Aono [6] discussed the possibility of information leakage caused by the communication between the central server and the client.…”
Section: Introductionmentioning
confidence: 99%
“…With the further development of federated learning, issues related to federated learning privacy protection have gradually attracted people's attention. Among them, secure multi-party computing [5] was first introduced as a means. Aono [6] discussed the possibility of information leakage caused by the communication between the central server and the client.…”
Section: Introductionmentioning
confidence: 99%
“…However, existing federated learning has the problem of a unique model, where all participants upload their local model parameters to the central server and aggregate them into the same model. In different real-world scenarios, data often has different features and distributions, and there is no universal model suitable for learning data from multiple scenarios [3][4][5] . In addition, existing federated learning is a centralized structure that relies entirely on the reliability of the central server, which also poses significant security risks [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…A large amount of existing vulnerability information is provided by vulnerability databases, open-source communities, security blogs, forums, etc. Although this can provide convenience for network security researchers to conduct vulnerability analysis and systematically study vulnerability mechanisms and vulnerability content, each vulnerability database is managed in a decentralized manner [5]. It is relatively difficult to integrate different vulnerability information [6].…”
Section: Introductionmentioning
confidence: 99%