ARP-miner: Mining risk patterns of android malware

4Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android applications need to request permissions to access sensitive personal data and system resources. Certain permissions may be requested by Android malware to facilitate their malicious activities. In this paper, we present ARP-Miner, an algorithm based on association rule mining that can automatically extract Android Risk Patterns indicating possible malicious activities of apps. The experimental results show that ARP-Miner can efficiently discover risk rules associating permission request patterns with malicious activities. Examples to relate the extracted risk patterns with behaviors of typical malware families are presented. It is also shown that the extracted risk patterns can be used for malware detection.

Cite

CITATION STYLE

APA

Wang, Y., Watson, B., Zheng, J., & Mukkamala, S. (2015). ARP-miner: Mining risk patterns of android malware. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9426, pp. 363–375). Springer Verlag. https://doi.org/10.1007/978-3-319-26181-2_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free