Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

被引:246
|
作者
Wang, Wei [1 ]
Wang, Xing [1 ]
Feng, Dawei [2 ]
Liu, Jiqiang [1 ]
Han, Zhen [1 ]
Zhang, Xiangliang [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Natl Univ Def Technol, Changsha 410073, Hunan, Peoples R China
[3] King Abdullah Univ Sci & Technol, Div Comp Elect & Math Sci & Engn, Thuwal 239556900, Saudi Arabia
关键词
Android system; Android security; permission usage analysis; malware detection; intrusion detection;
D O I
10.1109/TIFS.2014.2353996
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app's behavioral patterns. In order to help understanding Android permissions, in this paper, we explore the permission-induced risk in Android apps on three levels in a systematic manner. First, we thoroughly analyze the risk of an individual permission and the risk of a group of collaborative permissions. We employ three feature ranking methods, namely, mutual information, correlation coefficient, and T-test to rank Android individual permissions with respect to their risk. We then use sequential forward selection as well as principal component analysis to identify risky permission subsets. Second, we evaluate the usefulness of risky permissions for malapp detection with support vector machine, decision trees, as well as random forest. Third, we in depth analyze the detection results and discuss the feasibility as well as the limitations of malapp detection based on permission requests. We evaluate our methods on a very large official app set consisting of 310 926 benign apps and 4868 real-world malapps and on a third-party app sets. The empirical results show that our malapp detectors built on risky permissions give satisfied performance (a detection rate as 94.62% with a false positive rate as 0.6%), catch the malapps' essential patterns on violating permission access regulations, and are universally applicable to unknown malapps (detection rate as 74.03%).
引用
收藏
页码:1869 / 1882
页数:14
相关论文
共 50 条
  • [1] Discovering Persuaded Risk of Permission in Android Applications for Malicious Application Detection
    Singh, Pooja
    Singh, Santosh
    Tiwari, Pankaj
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 922 - 926
  • [2] Research on Data Mining of Permission-Induced Risk for Android IoT Devices
    Kumar, Rajesh
    Zhang, Xiaosong
    Khan, Riaz Ullah
    Sharif, Abubakar
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (02):
  • [3] Permission Sensitivity-Based Malicious Application Detection for Android
    Song, Yubo
    Geng, Yijin
    Wang, Junbo
    Gao, Shang
    Shi, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android Applications
    Hu, Xinwen
    [J]. IEEE Access, 2024, 12 : 165026 - 165041
  • [5] Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis
    Kandukuru, Satish
    Sharma, R. M.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1126 - 1132
  • [6] Contrasting Permission Patterns between Clean and Malicious Android Applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    Li, Gang
    Batten, Lynn
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 69 - 85
  • [7] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [8] Overprivileged Permission Detection for Android Applications
    Wu, Sha
    Liu, Jiajia
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [9] Exploring the Malicious Android Applications and Reducing Risk using Static Analysis
    Kavitha, K.
    Salini, P.
    Ilamathy, V
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1316 - 1319
  • [10] Automatic detection of inter-application permission leaks in Android applications
    Sbielea, D.
    Burke, M. G.
    Guarnieri, S.
    Pistoia, M.
    Sarkar, V.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)