Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3319535.3363193acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps

Published: 06 November 2019 Publication History

Abstract

Mobile apps have been an indispensable part in our daily life. However, there exist many potentially harmful apps that may exploit users' privacy data, e.g., collecting the user's information or sending messages in the background. Keeping these undesired apps away from the market is an ongoing challenge. While existing work provides techniques to determine what apps do, e.g., leaking information, little work has been done to answer, are the apps' behaviors compatible with the intentions reflected by the app's UI? In this work, we explore the synergistic cooperation of deep learning and program analysis as the first step to address this challenge. Specifically, we focus on the UI widgets that respond to user interactions and examine whether the intentions reflected by their UIs justify their permission uses. We present DeepIntent, a framework that uses novel deep icon-behavior learning to learn an icon-behavior model from a large number of popular apps and detect intention-behavior discrepancies. In particular, DeepIntent provides program analysis techniques to associate the intentions (i.e., icons and contextual texts) with UI widgets' program behaviors, and infer the labels (i.e., permission uses) for the UI widgets based on the program behaviors, enabling the construction of a large-scale high-quality training dataset. Based on the results of the static analysis, DeepIntent uses deep learning techniques that jointly model icons and their contextual texts to learn an icon-behavior model, and detects intention-behavior discrepancies by computing the outlier scores based on the learned model. We evaluate DeepIntent on a large-scale dataset (9,891 benign apps and 16,262 malicious apps). With 80% of the benign apps for training and the remaining for evaluation, DeepIntent detects discrepancies with AUC scores 0.8656 and 0.8839 on benign apps and malicious apps, achieving 39.9% and 26.1% relative improvements over the state-of-the-art approaches.

Supplementary Material

WEBM File (p2421-xi.webm)

References

[1]
Charu C Aggarwal. 2015. Outlier analysis. In Data mining.
[2]
Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, and Tao Xie. 2017. UiRef: Analysis of Sensitive User Inputs in Android Applications. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
[3]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
[4]
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. PScout: Analyzing the Android Permission Specification. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS).
[5]
Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining apps for abnormal usage of sensitive data. Proceedings of the International Conference on Software Engineering (ICSE).
[6]
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473.
[7]
David Barrera, H. Günecs Kayacik, Paul C. van Oorschot, and Anil Somayaji. 2010. A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS).
[8]
Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv.
[9]
Franccois Chollet et almbox. 2015. Keras. https://keras.io. (2015).
[10]
Alex Clark. 2010. Pillow. https://github.com/python-pillow/Pillow. (2010).
[11]
Octeau Damien, McDaniel Patrick, Jha Somesh, Bartel Alexandre, Bodden Eric, Klein Jacques, and Traon Yves, Le. 2013. Effective inter- component communication mapping in Android with EPIC: An essential step towards holistic security analysis. In Proceedings of the USENIX Security Symposium ((USENIX Security)).
[12]
Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, and Carl A. Gunter. 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In 23rd Annual Network and Distributed System Security Symposium (NDSS).
[13]
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition (CVPR).
[14]
Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, and Edward XueJun Wu. 2014. Collaborative Verification of Information Flow for a High-Assurance App Store. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS).
[15]
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. 2011a. Android Permissions Demystified (Proceedings of ACM Conference on Computer and Communications Security (CCS)).
[16]
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner. 2011b. A survey of mobile malware in the wild. In Proceedings of ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM).
[17]
Adrienne Porter Felt, Kate Greenwood, and David Wagner. 2011c. The Effectiveness of Application Permissions. In USENIX Conference on Web Application Development (WebApps).
[18]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS).
[19]
Ian J. Goodfellow, Yoshua Bengio, and Aaron C. Courville. 2016. Deep Learning .MIT Press. http://www.deeplearningbook.org/
[20]
Google. 2019. Android Permission Overview. (2019). https://developer.android.com/guide/topics/permissions/overview.
[21]
Alessandra Gorla, Ilaria Tavecchia, Florian Gross, and Andreas Zeller. 2014. Checking app behavior against app descriptions. In Proceedings of the International Conference on Software Engineering (ICSE).
[22]
Tianxiao Gu, Chengnian Sun, Xiaoxing Ma, Chun Cao, Chang Xu, Yuan Yao, Qirun Zhang, Jian Lu, and Zhendong Su. 2019. Practical GUI testing of Android applications via model abstraction and refinement. In Proceedings of the 41st International Conference on Software Engineering (ICSE).
[23]
Shuai Hao, Bin Liu, Suman Nath, William G. J. Halfond, and Ramesh Govindan. 2014. PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps. In The 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[24]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).
[25]
Geoffrey E. Hinton, Simon Osindero, and Yee-Whye Teh. 2006. A Fast Learning Algorithm for Deep Belief Nets. Neural Computing.
[26]
Geoffrey E Hinton and Ruslan R Salakhutdinov. 2006. Reducing the dimensionality of data with neural networks. Science.
[27]
David W Hosmer Jr, Stanley Lemeshow, and Rodney X Sturdivant. 2013. Applied logistic regression. Vol. 398. John Wiley & Sons.
[28]
Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q Weinberger. 2017. Densely connected convolutional networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).
[29]
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In USENIX Security Symposium ((USENIX Security)).
[30]
Jianjun Huang, Xiangyu Zhang, and Lin Tan. 2016. Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis. In ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE).
[31]
Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, and Bin Liang. 2014. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction. In Proceedings of the 36th International Conference on Software Engineering (ICSE).
[32]
Alex Krizhevsky and Geoffrey Hinton. 2009. Learning multiple layers of features from tiny images. Technical Report. Citeseer.
[33]
Yann LeCun, Yoshua Bengio, et almbox. 1995. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks.
[34]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature.
[35]
Li Li, Alexandre Bartel, Tegawendé Francc ois D Assise Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2015. IccTA: detecting inter-component privacy leaks in android apps. In Proceedings of the International Conference on Software Engineering (ICSE).
[36]
Li Li, Tegawendé F. Bissyandé, Damien Octeau, and Jacques Klein. 2016. DroidRA: taming reflection to support whole-program analysis of Android apps. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA).
[37]
Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. 2017. Static analysis of android apps: A systematic literature review. Information & Software Technology (IST).
[38]
Yuanchun Li, Yao Guo, and Xiangqun Chen. 2016. PERUIM: Understanding Mobile Application Privacy with permission-UI Mapping. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[39]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[40]
Bin Liu, Bin Liu, Hongxia Jin, and Ramesh Govindan. 2015a. Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps. In Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[41]
Bin Liu, Bin Liu, Hongxia Jin, and Ramesh Govindan. 2015b. Medusa: A programming framework for crowd-sensing applications. In Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).
[42]
Fei Tony Liu, Ming Ting Kai, and Zhi Hua Zhou. 2009. Isolation Forest. In Eighth IEEE International Conference on Data Mining (ICDM).
[43]
Thomas F. Liu, Mark Craft, Jason Situ, Ersin Yumer, Radom'i r Mech, and Ranjitha Kumar. 2018. Learning Design Semantics for Mobile Apps. In ACM Symposium on User Interface Software and Technology (UIST).
[44]
David G. Lowe. 1999. Object Recognition from Local Scale-Invariant Features. In Proceedings of the International Conference on Computer Vision (ICCV).
[45]
Jiasen Lu, Jianwei Yang, Dhruv Batra, and Devi Parikh. 2016. Hierarchical question-image co-attention for visual question answering. In Advances In Neural Information Processing Systems (NeurIPS).
[46]
Yun Ma, Yangyang Huang, Ziniu Hu, Xusheng Xiao, and Xuanzhe Liu. 2019. Paladin: Automated Generation of Reproducible Test Cases for Android Apps. In Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, HotMobile.
[47]
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems (NIPS).
[48]
K. W. Miller, J. Voas, and G. F. Hurlburt. 2012. BYOD: Security and Privacy Considerations. IT Professional.
[49]
Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and Xiaofeng Wang. 2015. Uipicker: User-input privacy identification in mobile applications. In Proceedings of the USENIX Security Symposium (USENIX Security).
[50]
Feiping Nie, Heng Huang, Xiao Cai, and Chris H Ding. 2010. Efficient and robust feature selection via joint ?2, 1-norms minimization. In NIPS.
[51]
Damien Octeau, Somesh Jha, Matthew Dering, Patrick D. McDaniel, Alexandre Bartel, Li Li, Jacques Klein, and Yves Le Traon. 2016. Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. In Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2016), St. Petersburg, FL, USA, January 20 - 22, 2016.
[52]
Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha, and Patrick McDaniel. 2015. Composite Constant Propagation: Application to Android Inter-component Communication Analysis. In Proceedings of the 37th International Conference on Software Engineering (ICSE)
[53]
Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. 2013. Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Proceedings of the USENIX Conference on Security (USENIX Security).
[54]
Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium.
[55]
Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP).
[56]
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, and Zhong Chen. 2014. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS).
[57]
Sridhar Ramaswamy, Rajeev Rastogi, and Kyuseok Shim. 2000. Efficient algorithms for mining outliers from large data sets. In ACM Sigmod Record.
[58]
Zdenko Podobny Ray Smith et almbox. 2006. Tesseract. https://github.com/tesseract-ocr/tesseract. (2006).
[59]
Sanae Rosen, Zhiyun Qian, and Z. Morely Mao. 2013. AppProfiler: A Flexible Method of Exposing Privacy-related Behavior in Android Applications to End Users. In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY).
[60]
E. Rosten, R. Porter, and T. Drummond. 2010. Faster and Better: A Machine Learning Approach to Corner Detection. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).
[61]
Atanas Rountev and Dacong Yan. 2014a. Static Reference Analysis for GUI Objects in Android Software. In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[62]
Atanas Rountev and Dacong Yan. 2014b. Static Reference Analysis for GUI Objects in Android Software. In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[63]
Bernhard Scholkopf, John C. Platt, John Shawe-Taylor, Alex J. Smola, and Robert C. Williamson. 2014. Estimating the Support of a High-Dimensional Distribution. Neural Computation.
[64]
Mei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn, and LiWu Chang. 2003. A novel anomaly detection scheme based on principal component classifier. Technical Report. MIAMI UNIV CORAL GABLES FL DEPT OF ELECTRICAL AND COMPUTER ENGINEERING.
[65]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.
[66]
statista. 2017. (2017). https://www.statista.com/statistics/266572/market-share-held-by-smartphone-platforms-in-the-united-states/.
[67]
Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, and Zhendong Su. 2017a. Guided, stochastic model-based GUI testing of Android apps. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (ESEC/FSE).
[68]
Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, and Zhendong Su. 2017b. Guided, stochastic model-based GUI testing of Android apps. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (ESEC/FSE).
[69]
Sainbayar Sukhbaatar, Jason Weston, Rob Fergus, et almbox. 2015. End-to-end memory networks. In Advances in neural information processing systems (NeurIPS).
[70]
Grigorios Tsoumakas and Ioannis Katakis. 2007. Multi-label classification: An overview. International Journal of Data Warehousing and Mining (IJDWM).
[71]
Connor Tumbleson and Ryszard Wisniewski. 2017. Apktool. (2017). https://ibotpeaches.github.io/Apktool/.
[72]
Raja Vallee-Rai, Etienne Gagnon, Laurie Hendren, Patrick Lam, Patrice Pominville, and Vijay Sundaresan. 2000. Optimizing Java Bytecode using the Soot Framework: Is it Feasible?. In Proceedings of the International Conference on Compiler Construction (CC).
[73]
Nicolas Viennot, Edward Garcia, and Jason Nieh. 2014. A Measurement Study of Google Play. In Proceedings of ACM SIGMETRICS conference (SIGMETRICS).
[74]
Haoyu Wang, Jason Hong, and Yao Guo. 2015a. Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).
[75]
Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, and Guoai Xu. 2018. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. In 2018 Internet Measurement Conference (IMC).
[76]
Haoyu Wang, Junjun Si, Hao Li, and Yao Guo. 2019. RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata. In The 16th International Conference on Mining Software Repositories (MSR 2019), Data Showcase Track.
[77]
Fengguo Wei, Sankardas Roy, Xinming Ou, and Robby. 2014. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS).
[78]
Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, and Peng Gao. 2019. IconIntent: Automatic Identification of Sensitive UI Widgets based on Icon Classification for Android Apps. In Proceedings of the International Conference on Software Engineering (ICSE).
[79]
Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev. 2015b. Static Control-Flow Analysis of User-Driven Callbacks in Android Applications. In Proceedings of the 37th International Conference on Software Engineering (ICSE).
[80]
Shengqian Yang, Hailong Zhang, Haowei Wu, Yan Wang, Dacong Yan, and Atanas Rountev. 2015. Static Window Transition Graphs for Android (T). Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[81]
Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. 2015a. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. In International Conference on Software Engineering (ICSE).
[82]
Zichao Yang, Diyi Yang, Chris Dyer, Xiaodong He, Alex Smola, and Eduard Hovy. 2016. Hierarchical attention networks for document classification. In Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies.
[83]
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, and X. Sean Wang. 2013c. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS).
[84]
Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, and Huibiao Zhu. 2017. RunDroid: recovering execution call graphs for Android applications. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (ESEC/FSE).
[85]
ZDNet. 2015. Research: 74 percent using or adopting BYOD. (2015). http://www.zdnet.com/article/research-74-percent-using-or-adopting-byod/
[86]
Mu Zhang, Yue Duan, Qian Feng, and Heng Yin. 2015. Towards Automatic Generation of Security-Centric Descriptions for Android Apps. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS).
[87]
Qi Zhang, Jiawen Wang, Haoran Huang, Xuanjing Huang, and Yeyun Gong. 2017. Hashtag Recommendation for Multimodal Microblog Using Co-Attention Network. In IJCAI.
[88]
Suwei Zhang, Yuan Yao, Fent Xu, Hanghang Tong, Xiaohui Yan, and Jian Lu. 2019. Hashtag Recommendation for Photo Sharing Services. AAAI.
[89]
Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, and Damien Octeau. 2018. Neural-augmented static analysis of Android communication. In Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
[90]
Yajin Zhou and Xuxian Jiang. 2012a. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S & P).
[91]
Yajin Zhou and Xuxian Jiang. 2012b. Dissecting Android Malware: Characterization and Evolution. In IEEE Symposium on Security and Privacy (IEEE S & P).
[92]
Xiaofeng Zhu, Cong Lei, Hao Yu, Yonggang Li, Jiangzhang Gan, and Shichao Zhang. 2018. Robust Graph Dimensionality Reduction. In IJCAI.

Cited By

View all
  • (2024)Survey and Analysis of User Perceptions of Security IconsProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3661295(202-209)Online publication date: 5-Jun-2024
  • (2024)No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOSProceedings of the 32nd IEEE/ACM International Conference on Program Comprehension10.1145/3643916.3644419(358-369)Online publication date: 15-Apr-2024
  • (2024)MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction UncertaintyProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639122(1-13)Online publication date: 20-May-2024
  • Show More Cited By

Index Terms

  1. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
      November 2019
      2755 pages
      ISBN:9781450367479
      DOI:10.1145/3319535
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 November 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. deep learning
      2. discrepancy detection
      3. mobile apps
      4. static analysis

      Qualifiers

      • Research-article

      Funding Sources

      • Natural Science Foundation of China

      Conference

      CCS '19
      Sponsor:

      Acceptance Rates

      CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)109
      • Downloads (Last 6 weeks)15
      Reflects downloads up to 30 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Survey and Analysis of User Perceptions of Security IconsProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3661295(202-209)Online publication date: 5-Jun-2024
      • (2024)No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOSProceedings of the 32nd IEEE/ACM International Conference on Program Comprehension10.1145/3643916.3644419(358-369)Online publication date: 15-Apr-2024
      • (2024)MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction UncertaintyProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639122(1-13)Online publication date: 20-May-2024
      • (2024)Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large ScaleIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335619719(3135-3147)Online publication date: 2024
      • (2023)What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile ApplicationsProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598076(538-550)Online publication date: 12-Jul-2023
      • (2023)DeUEDroid: Detecting Underground Economy Apps Based on UTG SimilarityProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598051(223-235)Online publication date: 12-Jul-2023
      • (2023)Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179482(2357-2374)Online publication date: May-2023
      • (2023)From Grim Reality to Practical Solution: Malware Classification in Real-World Noise2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179453(2602-2619)Online publication date: May-2023
      • (2023)Ex Pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution NetworkProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00168(1983-1995)Online publication date: 14-May-2023
      • (2023)Data Quality Matters: A Case Study of Obsolete Comment Detection2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)10.1109/ICSE48619.2023.00074(781-793)Online publication date: May-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media