Abstract | ||
---|---|---|
Android system uses a permission mechanism to allow users and developers to regulate access to private information and system resources required by Android applications (apps). Permissions can be behaviors and characteristics of an app, and widely used by Android malware detection. This paper designs a novel method to extract contrasting permission patterns for comparing the differences between Android benign apps and malware based on permissions, and use these differences to detect Android malware. Unlike existing works, this work first analyzes required and used permission. Then use support-based permission candidate method to mining unique required or used permission patterns, and use these patterns to detect Android malware. In experiment, this approach uses permission patterns from Android malware to detect a mixed Android app dataset. The results show that the proposed method can achieve 94% accuracy, 5% false positive, and 1% false negative. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/s10586-018-1904-x | Cluster Computing |
Keywords | DocType | Volume |
Android required permission, Android used permission, Malware detection, Permission pattern, Contrasting mining | Journal | 22 |
Issue | ISSN | Citations |
6 | 1573-7543 | 1 |
PageRank | References | Authors |
0.36 | 28 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chao Wang | 1 | 1 | 0.69 |
Qingzhen Xu | 2 | 1 | 0.36 |
Xiuli Lin | 3 | 1 | 0.36 |
Shouqiang Liu | 4 | 16 | 1.26 |