The evolution of permission as feature for android malware detection

9Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the last few years, the presence of mobile devices in our lives has increased, offering us almost the same functionality as personal computers. Since the arrival of Android devices, the amount of applications available for this operating system has increased exponentially. Android has become one of the most popular operating systems in these devices. In fact, malware writers insert malicious applications into Android using the Play store and other alternative markets. Lately, many new approaches have been made. Sanz et al., for instance, presented PUMA, a method used to detect malicious apps just by taking a look at the permissions. In this paper, we present the differences between that interesting approach and a newer and bigger dataset. Besides, we also present an evolution in the permissions along the years.

Cite

CITATION STYLE

APA

de la Puerta, J. G., Sanz, B., Grueiro, I. S., & Bringas, P. G. (2015). The evolution of permission as feature for android malware detection. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 389–400). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free