Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382224
|View full text |Cite
|
Sign up to set email alerts
|

Using probabilistic generative models for ranking risks of Android apps

Abstract: One of Android's main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the app requires, trusting that the user will make the right decision. This approach has been shown to be ineffective as it presents the risk information of each app in a "stand-alone" fashion and in a way that requires too much technical knowledge and time to distill useful information.We introduce the notion of risk scoring and risk ranki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
223
0
3

Year Published

2014
2014
2021
2021

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 308 publications
(228 citation statements)
references
References 20 publications
2
223
0
3
Order By: Relevance
“…Table 8 shows how the results in this paper measures against the best results of [1], [20], [22], [23], [24], [33], and [41] respectively (using the available metrics). These comparative results show that our approach in this paper outperforms previous similar efforts.…”
Section: Results Comparison With Existing Workmentioning
confidence: 99%
“…Table 8 shows how the results in this paper measures against the best results of [1], [20], [22], [23], [24], [33], and [41] respectively (using the available metrics). These comparative results show that our approach in this paper outperforms previous similar efforts.…”
Section: Results Comparison With Existing Workmentioning
confidence: 99%
“…With regards to state-of-the-art literature tackled in this work, a significant number of Machine Learning approaches for malware detection [6,29,[36][37][38][39] have been presented to the research community. The feature set that we use in this paper was evaluated in [23] and achieved better performance than those approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, any app can be classified even if coming from unknown marketplaces. Another app classification system is presented in [32], where apps are classified in comparison with formerly analyzed apps. The methodology exploits probabilistic generative models to analyze apps on different criteria including permissions.…”
Section: Related Workmentioning
confidence: 99%