Automatically Detecting Malicious Sensitive Data Usage in Android Applications

被引:0
|
作者
Yan, Hongbing [1 ]
Xiong, Yan [1 ]
Huang, Wenchao [1 ]
Huang, Jianmeng [1 ]
Meng, Zhaoyi [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
关键词
D O I
10.1109/BIGCOM.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android devices have increased rapidly in recent years. Because sensitive data of users can bring huge profits, there are so many malicious Android applications (apps) which aim at users' sensitive data in Android markets. Malicious apps may collect sensitive data of users, such as phone number, location, contact information, and send them to advertisers or attackers. To prevent malicious apps from stealing user information, a simple solution is not to grant corresponding permissions to apps. But if we don't give corresponding permissions, the apps may exit directly. This affects the normal use of apps. In order to solve the above problems, we design a system which uses machine-learning technology to detect malicious behaviours. Our system is based on the observation that apps in the same category usually use sensitive data in the same or similar way. The system implements automatic detection of malicious behaviours. The true positive rate of our system can be over 90% and the false positive rate can be below 8%.
引用
收藏
页码:102 / 107
页数:6
相关论文
共 50 条
  • [41] ApkClassiFy: Identification and Classification of packed Android Malicious Applications
    Guo, Xu
    Zheng, Tao
    Chen, Xingshu
    Wang, Qixu
    Shao, Jiang
    Hu, Zhijie
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2092 - 2097
  • [42] DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
    Gupta, Charu
    Singh, Rakesh Kumar
    Bhatia, Simran Kaur
    Mohapatra, Amar Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 57 - 73
  • [43] A Novel Approach to Restrict the Access of Malicious Applications in Android
    Dar, Muneer Ahmad
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [44] Detecting Malicious Manipulation of Synchrophasor Data
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe H.
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, : 145 - 150
  • [45] Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
    Wang, Wei
    Li, Yuanyuan
    Wang, Xing
    Liu, Jiqiang
    Zhang, Xiangliang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 987 - 994
  • [46] Combining Multimodal DNN and SigPid technique for detecting Malicious Android Apps
    Vasu, Balaji
    Pari, Neelavathy
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC 2019), 2019, : 289 - 294
  • [47] Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis
    Liu, Xing
    Liu, Jiqiang
    Wang, Wei
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [48] Automatically Exploiting Potential Component Leaks in Android Applications
    Li, Li
    Bartel, Alexandre
    Klein, Jacques
    le Traon, Yves
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 388 - 397
  • [49] Detecting Malicious Behaviors in Java']JavaScript Applications
    Mao, Jian
    Bian, Jingdong
    Bai, Guangdong
    Wang, Ruilong
    Chen, Yue
    Xiao, Yinhao
    Liang, Zhenkai
    IEEE ACCESS, 2018, 6 : 12284 - 12294
  • [50] Privilege Escalation Detecting in Android Applications
    Zhong, Xingqiu
    Zeng, Fanping
    Cheng, Zhichao
    Xie, Niannian
    Qin, Xiaoxia
    Guo, Shuli
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 39 - 44