Title :
A security assessment method for Android applications based on permission model
Author :
Danyang Jiang ; Xiangling Fu ; Maoqiang Song ; Yidong Cui
Author_Institution :
Sch. of Software Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
Permission-based security model of Android restricts applications to access specific resources, but malicious applications can invade more easily in such user-centric pattern. Through the analysis of the Android Permission-based security model and the permission features of Android applications, we establish the permission model to quantify the functional characteristics of the application, and then provide an assessment method in which we use the network visualization techniques and clustering algorithm to determine whether the testing application is potentially malicious application or not so as to help users choose applications before installation. We test the assessment method on 873 applications available online and do the statistic and analysis of the results to find that this method can do efforts in finding potentially malicious applications.
Keywords :
operating system kernels; pattern clustering; security of data; statistical analysis; Android applications; Android permission-based security model; application functional characteristics; clustering algorithm; malicious applications; network visualization techniques; permission-based security model; potentially malicious applications; security assessment method; user-centric pattern; Analytical models; Androids; Humanoid robots; Mobile communication; Security; Smart phones; Vectors; Android; malicious application; permission; permission model; security; visualization technology;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664265