Contrasting permission patterns between clean and malicious android applications

8Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications.

Cite

CITATION STYLE

APA

Moonsamy, V., Rong, J., Liu, S., Li, G., & Batten, L. (2013). Contrasting permission patterns between clean and malicious android applications. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 127 LNICST, pp. 69–85). Springer Verlag. https://doi.org/10.1007/978-3-319-04283-1_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free