Over the last few years, the presence of mobile devices in our lives has increased, offering us almost the same functionality as personal computers. Since the arrival of Android devices, the amount of applications available for this operating system has increased exponentially. Android has become one of the most popular operating systems in these devices. In fact, malware writers insert malicious applications into Android using the Play store and other alternative markets. Lately, many new approaches have been made. Sanz et al., for instance, presented PUMA, a method used to detect malicious apps just by taking a look at the permissions. In this paper, we present the differences between that interesting approach and a newer and bigger dataset. Besides, we also present an evolution in the permissions along the years.
CITATION STYLE
de la Puerta, J. G., Sanz, B., Grueiro, I. S., & Bringas, P. G. (2015). The evolution of permission as feature for android malware detection. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 389–400). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_33
Mendeley helps you to discover research relevant for your work.