Loading...
Please wait, while we are loading the content...
Similar Documents
Permissions Based Android Malware Stealing Privacy Data Detection
| Content Provider | Semantic Scholar |
|---|---|
| Author | Zeng, Zhe-Ling Lin, Bogang |
| Copyright Year | 2018 |
| Abstract | The large numbers of malwares steal user privacy data in the Android application market, which poses a huge threat to user privacy data. To alleviate the threat, a scheme is proposed in this paper which based on privilege-feature detection. First, we filter sensitive privilege-feature that used to achieve attack out from the built-in permissions of Android. Second, based on sensitive privilege-feature, I design a scoring formula which can used to determine if the application is malicious; Last, I implement a prototype tool base on this method. Using this tool to detect malicious applications, the experimental results show that this method is more effective than the general antivirus engine. Introduction According to the 2016 "China Internet Development Statistics Report" shows that as of June 2016, the number of Chinese mobile Internet users reached 665 million, of which Android mobile phone users accounted for 67.8% [1].As the Android mobile phone market share and Android operating system open source resulting in Android user privacy data has become a malware of the target [10] [11]. According to the report, the total number of new Android malwares in 2016 intercepted 14.33 million. The number of malwares that steal privacy data accounts for 6.1% of the total. The report counts the number of years of user privacy data, including contacts, text messages, call records, photos. Their number is 1.44 billion, 7.18 billion, 5.15 billion and 252.0 million. To alleviate threat we have done three tasks: (1)Manually analyze malwares that stealing user privacy data, to sort out set of sensitive permissions combinations and sensitive permissions. (2)Based on the set of sensitive permissions database, we designed a lightweight detection method that can detect malwares that steal user privacy data. (3)According to the detection method that has be designed to achieve the tool and use tool to experiment. The experimental results show that the tool can detect malware more effectively than the general antivirus engine. Next, the article introduces the process of detecting the malicious application of Android user privacy data in the first section. The second section describes how to get the sensitive permission characteristics and calculation application points in the detection process; The third section carried out the experiment and analyzed the experimental results. The fourth section introduces related work. The fifth section summarizes the methods used in this paper and the direction of the research in future. |
| File Format | PDF HTM / HTML |
| DOI | 10.12783/dtcse/iceit2017/19871 |
| Alternate Webpage(s) | http://www.dpi-proceedings.com/index.php/dtcse/article/viewFile/19871/19359 |
| Alternate Webpage(s) | https://doi.org/10.12783/dtcse%2Ficeit2017%2F19871 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |