Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2382196.2382224acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Using probabilistic generative models for ranking risks of Android apps

Published: 16 October 2012 Publication History
  • Get Citation Alerts
  • Abstract

    One of Android's main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the app requires, trusting that the user will make the right decision. This approach has been shown to be ineffective as it presents the risk information of each app in a "tand-alone" ashion and in a way that requires too much technical knowledge and time to distill useful information.
    We introduce the notion of risk scoring and risk ranking for Android apps, to improve risk communication for Android apps, and identify three desiderata for an effective risk scoring scheme. We propose to use probabilistic generative models for risk scoring schemes, and identify several such models, ranging from the simple Naive Bayes, to advanced hierarchical mixture models. Experimental results conducted using real-world datasets show that probabilistic general models significantly outperform existing approaches, and that Naive Bayes models give a promising risk scoring approach.

    References

    [1]
    Andromo. http://andromo.com.
    [2]
    Appsgeyser. http://appsgeyser.com.
    [3]
    Google Bouncer. http://goo.gl/QnC6G.
    [4]
    N. Amor, S. Benferhat, and Z. Elouedi. Naive bayes vs decision trees in intrusion detection systems. In Proceedings of the 2004 ACM symposium on Applied computing, pages 420--424. ACM, 2004.
    [5]
    K. Au, Y. Zhou, Z. Huang, P. Gill, and D. Lie. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 63--68. ACM, 2011.
    [6]
    D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, pages 73--84. ACM, 2010.
    [7]
    C. M. Bishop. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, 2007.
    [8]
    D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation. J. Mach. Learning Research, 3, 2003.
    [9]
    W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1--6. USENIX Association, 2010.
    [10]
    W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21--21, Berkeley, CA, USA, 2011. USENIX Association.
    [11]
    W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 235--245, New York, NY, USA, 2009. ACM.
    [12]
    B. Fathi. Engineering windows 7 : User account control, October 2008. MSDN blog on User Account Control.
    [13]
    A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627--638. ACM, 2011.
    [14]
    A. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In Proc. of the USENIX Conference on Web Application Development, 2011.
    [15]
    A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of install-time permission systems for third-party applications. Technical Report UCB/EECS-2010-143, EECS Department, University of California, Berkeley, Dec 2010.
    [16]
    J. Goodman and W. Yih. Online discriminative spam filter training. In Proceedings of the Third Conference on Email and Anti-Spam (CEAS), 2006.
    [17]
    W. A. Magat, W. K. Viscusi, and J. Huber. Consumer processing of hazard warning information. Journal of Risk and Uncertainty, 1(2):201--32, June 1988.
    [18]
    V. Metsis, I. Androutsopoulos, and G. Paliouras. Spam filtering with naive bayes-which naive bayes. In Third conference on email and anti-spam (CEAS), volume 17, pages 28--69, 2006.
    [19]
    S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege?: investigating user account control practices. In Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM, 2010.
    [20]
    M. Nauman, S. Khan, and X. Zhang. Apex: Extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 328--332. ACM, 2010.
    [21]
    M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. In Computer Security Applications Conference, 2009. ACSAC'09. Annual, pages 340--349. Ieee, 2009.
    [22]
    G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 347--356. ACM, 2010.
    [23]
    R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang. Plagiarizing smartphone applications: Attack strategies and defense. In Engineering Secure Software and Systems. Springer, 2012.
    [24]
    B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Android permissions: A perspective combining risks and benefits. In SACMAT '12: Proceedings of the seventeenth ACM symposium on Access control models and technologies. ACM, 2012.
    [25]
    K. Schneider. A comparison of event models for naive bayes anti-spam e-mail filtering. In Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics-Volume 1, pages 307--314. Association for Computational Linguistics, 2003.
    [26]
    A. Sebyala, T. Olukemi, and L. Sacks. Active platform security through intrusion detection using naive bayesian network for anomaly detection. In London Communications Symposium. Citeseer, 2002.
    [27]
    A. Shabtai and Y. Elovici. Applying behavioral detection on android-based devices. Mobile Wireless Middleware, Operating Systems, and Applications, pages 235--249, 2010.
    [28]
    Y. Song, A. KoBcz, and C. L. Giles. Better naive bayes classification for high-precision spam detection. In Software Practice and Experience, 2009.
    [29]
    D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy Marketing, 13(1):1--19, 1994.
    [30]
    T. Vidas, N. Christin, and L. Cranor. Curbing android permission creep. In Proceedings of the Web, volume 2, 2011.
    [31]
    Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012.

    Cited By

    View all
    • (2024)Kötü Amaçlı Yazılım Tespiti için Makine Öğrenmesi Algoritmalarının KullanımıUsing Machine Learning Algorithms for Malware DetectionDüzce Üniversitesi Bilim ve Teknoloji Dergisi10.29130/dubited.128745312:1(307-319)Online publication date: 26-Jan-2024
    • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
    • (2024)IPAnalyzer: A novel Android malware detection system using ranked Intents and PermissionsMultimedia Tools and Applications10.1007/s11042-024-18511-6Online publication date: 1-Mar-2024
    • Show More Cited By

    Index Terms

    1. Using probabilistic generative models for ranking risks of Android apps

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
        October 2012
        1088 pages
        ISBN:9781450316514
        DOI:10.1145/2382196
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 16 October 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. data mining
        2. malware
        3. mobile
        4. risk

        Qualifiers

        • Research-article

        Conference

        CCS'12
        Sponsor:
        CCS'12: the ACM Conference on Computer and Communications Security
        October 16 - 18, 2012
        North Carolina, Raleigh, USA

        Acceptance Rates

        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)53
        • Downloads (Last 6 weeks)5
        Reflects downloads up to

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Kötü Amaçlı Yazılım Tespiti için Makine Öğrenmesi Algoritmalarının KullanımıUsing Machine Learning Algorithms for Malware DetectionDüzce Üniversitesi Bilim ve Teknoloji Dergisi10.29130/dubited.128745312:1(307-319)Online publication date: 26-Jan-2024
        • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
        • (2024)IPAnalyzer: A novel Android malware detection system using ranked Intents and PermissionsMultimedia Tools and Applications10.1007/s11042-024-18511-6Online publication date: 1-Mar-2024
        • (2024)A comprehensive review on permissions-based Android malware detectionInternational Journal of Information Security10.1007/s10207-024-00822-223:3(1877-1912)Online publication date: 4-Mar-2024
        • (2023)RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare SystemsIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.318859710:5(2574-2583)Online publication date: 1-Sep-2023
        • (2023)RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER56733.2023.00065(639-650)Online publication date: Mar-2023
        • (2023)Android malware detection: mission accomplished? A review of open challenges and future perspectivesComputers & Security10.1016/j.cose.2023.103654(103654)Online publication date: Dec-2023
        • (2023)Classification and security assessment of android appsDiscover Internet of Things10.1007/s43926-023-00047-03:1Online publication date: 16-Oct-2023
        • (2023)DeMAndApp: Detecting Malicious Android AppApplied Computing for Software and Smart Systems10.1007/978-981-99-7783-3_13(199-219)Online publication date: 27-Dec-2023
        • (2022)Review of Works Content Analyzer for Information Leakage Detection and Prevention in Android Smart DevicesABUAD International Journal of Natural and Applied Sciences10.53982/aijnas.2022.0201.02-j2:1(12-28)Online publication date: 30-Mar-2022
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media