An Effective Risk Computation Metric for Android Malware Detection
Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 4
Abstract
Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions. Therefore, a systematic user assistance mechanism for making appropriate decisions can significantly improve the security of Android based devices by preventing malicious apps installation. However, the criticality of permissions and the security risk values of apps are not well determined for users in order to make correct decisions. In this study, a new metric is introduced for effective risk computation of untrusted apps based on their required permissions. The metric leverages both frequency of permission usage in malwares and rarity of them in normal apps. Based on the proposed metric, an algorithm is developed and implemented for identifying critical permissions and effective risk computation. The proposed solution can be directly used by the mobile owners to make better decisions or by Android markets to filter out suspicious apps for further examination. Empirical evaluations on real malicious and normal app samples show that the proposed metric has high malware detection rate and is superior to recently proposed risk score measurements. Moreover, it has good performance on unseen apps in term of security risk computation.
Authors and Affiliations
Mahmood Deypir, Ehsan Sharifi
A Semantic Approach to Person Profile Extraction from Farsi Web Documents
Entity profiling (EP) as an important task of Web mining and information extraction (IE) is the process of extracting entities in question and their related information from given text resources. From computational viewp...
Design, Implementation and Evaluation of Multi-terminal Binary Decision Diagram based Binary Fuzzy Relations
Elimination of redundancies in the memory representation is necessary for fast and efficient analysis of large sets of fuzzy data. In this work, we use MTBDDs as the underlying data-structure to represent fuzzy sets and...
Automatic Construction of Domain Ontology Using Wikipedia and Enhancing it by Google Search Engine
The foundation of the Semantic Web are ontologies. Ontologies play the main role in the exchange of information and development of the Lexical Web to the Semantic Web. Manual construction of ontologies is time-consuming,...
Fusion Infrared and Visible Images Using Optimal Weights
Image fusion is a process in which different images recorded by several sensors from one scene are combined to provide a final image with higher quality compared to each individual input image. In fact, combination of di...
BER Performance Analysis of MIMO-OFDM Communication Systems Using Iterative Technique Over Indoor Power Line Channels in an Impulsive Noise Environment
This paper addresses the performance of MIMO-OFDM communication system in environments where the interfering noise exhibits non-Gaussian behavior due to impulsive phenomena. It presents the design and simulation of an it...