Automatically Detecting Malicious Sensitive Data Usage in Android Applications

被引:0
|
作者
Yan, Hongbing [1 ]
Xiong, Yan [1 ]
Huang, Wenchao [1 ]
Huang, Jianmeng [1 ]
Meng, Zhaoyi [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
关键词
D O I
10.1109/BIGCOM.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android devices have increased rapidly in recent years. Because sensitive data of users can bring huge profits, there are so many malicious Android applications (apps) which aim at users' sensitive data in Android markets. Malicious apps may collect sensitive data of users, such as phone number, location, contact information, and send them to advertisers or attackers. To prevent malicious apps from stealing user information, a simple solution is not to grant corresponding permissions to apps. But if we don't give corresponding permissions, the apps may exit directly. This affects the normal use of apps. In order to solve the above problems, we design a system which uses machine-learning technology to detect malicious behaviours. Our system is based on the observation that apps in the same category usually use sensitive data in the same or similar way. The system implements automatic detection of malicious behaviours. The true positive rate of our system can be over 90% and the false positive rate can be below 8%.
引用
收藏
页码:102 / 107
页数:6
相关论文
共 50 条
  • [31] A Novel Method to Avoid Malicious Applications on Android
    Lee, Sangho
    Ju, Da Young
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 121 - 130
  • [32] Automated identification of installed malicious Android applications
    Guido, Mark
    Ondricek, Jared
    Grover, Justin
    Wilburn, David
    Thanh Nguyen
    Hunt, Andrew
    DIGITAL INVESTIGATION, 2013, 10 : S96 - S104
  • [33] Detection of Android Malicious Apps Based on the Sensitive Behaviors
    Quan, Daiyong
    Zhai, Lidong
    Yang, Fan
    Wang, Peng
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 877 - 883
  • [34] Detecting Malicious Android Apps using the Popularity and Relations of APIs
    Jung, Jaemin
    Lim, Kyeonghwan
    Kim, Byoungchul
    Cho, Seong-je
    Han, Sangchul
    Suh, Kyoungwon
    2019 IEEE SECOND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2019, : 309 - 312
  • [35] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [36] ShellBreaker: Automatically detecting PHP-based malicious web shells
    Li, Yu
    Huang, Jin
    Ikusan, Ademola
    Mitchell, Milliken
    Zhang, Junjie
    Dai, Rui
    COMPUTERS & SECURITY, 2019, 87
  • [37] Ebserver: Automating Resource-Usage Data Collection of Android Applications
    Oliveira, Wellington
    Moraes, Bernardo
    Castor, Fernando
    Fernandes, Joao Paulo
    2023 IEEE/ACM 10TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2023, : 55 - 59
  • [38] Visualizing Android Malicious Applications Using Texture Features
    Sharma, Tejpal
    Rattan, Dhavleesh
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (06)
  • [39] On the Efficacy of Static Features to Detect Malicious Applications in Android
    Geneiatakis, Dimitris
    Satta, Riccardo
    Fovino, Igor Nai
    Neisse, Ricardo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 87 - 98
  • [40] CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android
    Cui, Xingmin
    Yu, Da
    Chan, Patrick
    Hui, Lucas C. K.
    Yiu, S. M.
    Qing, Sihan
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 446 - 453