Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Research on android malware permission pattern using permission monitoring system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout.

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded

The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Arxan (2012) State of Security in the App Economy: Mobile Apps under Attack

  2. Barrera D et al (2010) A methodology for empirical analysis of permission-based security models and its application to android. Proceedings of the 17th ACM conference on Computer and communications security. ACM

  3. Chandramohan M, Tan HBK (2012) Detection of moblie malware in the wild. Computer 45(9)

  4. Chandramohan M, Tan HBK (2012) Detection of moblie malware in the wild. Computer 45(9)

  5. Enck W et al (2009) Understanding android security. IEEE Security & Privacy Magazine 7(1):50–57

    Article  Google Scholar 

  6. Enck W, et al (2011) A Study of Android Application Security. Proc. 20th USENIX Conf. Security, Security

  7. F-Secure. Threat description: Trojan:android/droidkungfu.c. Available: http://www.f-secure.com/v-descs/trojan_android_droidkungfu_c.shtml. Accessed 15.02.10

  8. F-Secure. Threat description: Trojan:android/ginmaster.a. http://www.f-secure.com/v-descs/trojan_android_ginmaster_a.shtml. Accessed 15.02.10

  9. F-Secure. Threat description: Trojan-downloader:osx/ashback.c http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_c.shtml. Accessed 15.02.10.

  10. F-Secure. Threat description: Virus:boot/brain. http://www.f-secure.com/v-descs/brain.shtml. Accessed 15.02.10.

  11. Felt AP et al (2011) Android Permissions Demystified. Proc. 18th ACM Conf Comput Commun Security (CCS)

  12. F-Secure (2014) Mobile threat report

  13. McAfee (2012) McAfee Threats Report: First Quarter 2012

  14. Moser A, Kruegel C, Kirda E (2007) Exploring Multiple Execution Paths for Malware Analysis. Proc. IEEE Symp. Security Privacy, SP, pp 231–245

  15. Shabtai A et al (2009) Google Android: A State-of-the-art Review of Security Mechanisms. Technical Report. Cornell University

  16. Xu R, Saidi H Anderson R (2012) Aurasium: Practical Policy Enforcement for Android Applications. 21st USENIX Security Symp. USENIX

  17. Yan LK, Yin H (2012) DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. Proc 21st USENIX conf. Security Symp., Security

  18. Zhou Y, Jiang X (2012) Dissecting Android Malware: Characterization and Evolution. Proc 33rd IEEE Symp Security and Privacy

Download references

Acknowledgments

This work was supported by the ICT R&D program of MSIP/IITP, Republic of Korea. [13-912-06-003, Development of Mobile S/W Security Testing Tools for Detecting New Vulnerabilities of Android]

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Kwak.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ju, Sh., Seo, Hs. & Kwak, J. Research on android malware permission pattern using permission monitoring system. Multimed Tools Appl 75, 14807–14817 (2016). https://doi.org/10.1007/s11042-016-3273-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3273-x

Keywords