2019
DOI: 10.4018/ijesma.2019040101
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches

Abstract: Android-based devices easily fall prey to an attack due to its free availability in the android market. These Android applications are not certified by the legitimate organization. If the user cannot distinguish between the set of permissions requested by an application and its risk, then an attacker can easily exploit the permissions to propagate malware. In this article, the authors present an approach for privacy risk analysis in Android applications using machine learning. The proposed approach can analyse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…As the main goal of the risk model is to consider the permission aggregation caused privacy risk to identical owners, the study might have limited accuracy. The accuracy of our proposed classification showed a lower score in comparison to other Android application based PII classification approaches [68,97]. The size of the dataset was one of the major limitations of this study.…”
Section: Limitationsmentioning
confidence: 74%
See 1 more Smart Citation
“…As the main goal of the risk model is to consider the permission aggregation caused privacy risk to identical owners, the study might have limited accuracy. The accuracy of our proposed classification showed a lower score in comparison to other Android application based PII classification approaches [68,97]. The size of the dataset was one of the major limitations of this study.…”
Section: Limitationsmentioning
confidence: 74%
“…As classification helps to differentiate attack surfaces and prepare accordingly [64], studies [7,9,10,17,65] have already analyzed app permissions for privacy threat modeling [66][67][68]. A study [69] states five ways of privacy breaching through the app permission system.…”
Section: Android Application Permission Associated Privacy Riskmentioning
confidence: 99%
“…AndroidManifest.XML file is present in the root directory, which stores essential information related to application on the Android system. 36,37 The permission mechanism should be working effectively before allowing the application to get the required asset. In any case, consents for every single proclaimed permission is not required for the particular application.…”
Section: • Signature-based Approachmentioning
confidence: 99%
“…The data stored in the device cannot be accessed without the required permissions. AndroidManifest.XML file is present in the root directory, which stores essential information related to application on the Android system 36,37 . The permission mechanism should be working effectively before allowing the application to get the required asset.…”
Section: Background Information On Permission Analysismentioning
confidence: 99%
“…It can also distinguish high‐level malware and identify high‐risk malware. In contrast, regarding dynamic investigations, fundamental discovery and analysis are performed at runtime (Li et al, 2018; Navarro, Navarro, Grégio, Rocha, & Dahab, 2018; Nirumand, Zamani, & Tork Ladani, 2019; Sharma & Gupta, 2019; Tam, Feizollah, Anuar, Salleh, & Cavallaro, 2017).…”
Section: Introductionmentioning
confidence: 99%