Education, Science, Technology, Innovation and Life
Open Access
Sign In

Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage

Download as PDF

DOI: 10.23977/jeis.2017.21007 | Downloads: 7 | Views: 3119

Author(s)

Zheling Zeng 1, Bogang Lin 1, Yitao Ni 1, Yongjia Chen 1

Affiliation(s)

1 Mathematics and computer science college, Fuzhou University

Corresponding Author

Zheling Zeng

ABSTRACT

Nowadays, leakage of Android private information security is protected by application audit mechanism in formal application store and the Android mobile security mechanism. But because of insufficient of these two security, mechanism leakage of privacy incidents happened frequently. In this paper, we get the sensitive resources permission mapping table and sends the data permission mapping table according to the relationship between resources and permission and characteristics of sensitive resources. The judging rules and the detection process for the malicious application of privacy leakage are developed from these two mapping tables. Finally, 884application samples are tested and the experiment result demonstrates the advantages and disadvantages of the method.

KEYWORDS

Android system; Malicious application; Detection method; Resource access.

CITE THIS PAPER

Zheling, Z. , Bogang, L. , Yitao, N. , Yongjia, C. (2017) Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage. Journal of Electronics and Information Science (2017) 2: 56-61.

REFERENCES

[1] Symantec. Twentieth Internet Security Threat Report [J]. Financial Computer of China, 2015, (5):95-95.
[2] Drake JJ, Lanier Z, Mulliner C, et al. Android Hacker's Handbook [J]. 2014.
[3] Elenkov N. Android Security Internals: An In-Depth Guide to Android's Security Architecture [M]. No Starch Press, 2014.
[4] Jiang X, Zhou Y. Dissecting Android Malware: Characterization and Evolution[C]// IEEE Symposium on Security & Privacy. IEEE, 2012:95-109.
[5] Nauman M, Khan S, Zhang X. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints[C]// 5th international symposium on Acm symposium on information, computer and communications security. 2010:328-332.
[6] Bingquan Xu, Yuan Zhang, Min Yang. GrantDroid: a kind of support Android
[7] Yubin Wang, Chao Li, Nan Cheng. Research on personal sensitive information protection of Internet [J]. information network security, 2014(9):144-148.WANG Y B, LI C, CHENG N. Research personal sensitive information protection on Internet[J]. Information Network Security, 2014(9):144-148.
[8] Ker A, Watt S, Myrhaug H I, et al.  An ambient, personalized, and context-sensitive information system for mobile users [C]// European Union Symposium on Ambient Intelligence. ACM, 2004.
[9] Zhang N, Yuan K, Naveed M, et al. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android [J]. 2015:915-930.

Downloads: 6656
Visits: 255679

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.