Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage
DOI: 10.23977/jeis.2017.21007 | Downloads: 7 | Views: 3119
Author(s)
Zheling Zeng 1, Bogang Lin 1, Yitao Ni 1, Yongjia Chen 1
Affiliation(s)
1 Mathematics and computer science college, Fuzhou University
Corresponding Author
Zheling ZengABSTRACT
Nowadays, leakage of Android private information security is protected by application audit mechanism in formal application store and the Android mobile security mechanism. But because of insufficient of these two security, mechanism leakage of privacy incidents happened frequently. In this paper, we get the sensitive resources permission mapping table and sends the data permission mapping table according to the relationship between resources and permission and characteristics of sensitive resources. The judging rules and the detection process for the malicious application of privacy leakage are developed from these two mapping tables. Finally, 884application samples are tested and the experiment result demonstrates the advantages and disadvantages of the method.
KEYWORDS
Android system; Malicious application; Detection method; Resource access.CITE THIS PAPER
Zheling, Z. , Bogang, L. , Yitao, N. , Yongjia, C. (2017) Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage. Journal of Electronics and Information Science (2017) 2: 56-61.
REFERENCES
[1] Symantec. Twentieth Internet Security Threat Report [J]. Financial Computer of China, 2015, (5):95-95.
[2] Drake JJ, Lanier Z, Mulliner C, et al. Android Hacker's Handbook [J]. 2014.
[3] Elenkov N. Android Security Internals: An In-Depth Guide to Android's Security Architecture [M]. No Starch Press, 2014.
[4] Jiang X, Zhou Y. Dissecting Android Malware: Characterization and Evolution[C]// IEEE Symposium on Security & Privacy. IEEE, 2012:95-109.
[5] Nauman M, Khan S, Zhang X. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints[C]// 5th international symposium on Acm symposium on information, computer and communications security. 2010:328-332.
[6] Bingquan Xu, Yuan Zhang, Min Yang. GrantDroid: a kind of support Android
[7] Yubin Wang, Chao Li, Nan Cheng. Research on personal sensitive information protection of Internet [J]. information network security, 2014(9):144-148.WANG Y B, LI C, CHENG N. Research personal sensitive information protection on Internet[J]. Information Network Security, 2014(9):144-148.
[8] Ker A, Watt S, Myrhaug H I, et al. An ambient, personalized, and context-sensitive information system for mobile users [C]// European Union Symposium on Ambient Intelligence. ACM, 2004.
[9] Zhang N, Yuan K, Naveed M, et al. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android [J]. 2015:915-930.
Downloads: | 6656 |
---|---|
Visits: | 255679 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar