Android Apps Security Evaluation System in the Cloud
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2016, Vol 2, Issue 6
Abstract
It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Apps. For the Apps security evaluation, the paper proceed from the Android permission mechanism, proposes a classified dynamic security evaluation method. Apps security evaluation system include the large-scale permissions capturing and classification risk evaluation algorithm. The system could find the minimum permissions which are the common features of Apps. The minimum permissions can be dynamically changed according to different classified Apps. We adopt Euclidean distance-based similarity calculation algorithm to evaluate risk. The difference value determines the APP’s malicious risk. Experiments prove that the system has reference value to the APP security assessment.
Authors and Affiliations
Hao Wang, Tao Li, Tong Zhang, Jie Wang
A performance model of the Trusted Cloud Computing Platform VM Launch Protocol
The adoption of the cloud computing paradigm is associated with increasing security concerns. Cloud computing service models (SaaS, PaaS and IaaS) are exposed to different security threats in each level of services. The...
Specification of REST API Services for Modbus Protocol using Formal technique
With the advancements in technologies, there has been a growing trend to move from desktop applications towards web and mobile applications. This move was made possible through introduction of the RESTful Web Services. T...
A Model Transformation Tool: PMIF+ to QNAP
An extension to the Performance Model Interchange Format (PMIF+) to move models among tools has been recently introduced. The original PMIF was limited to models solvable with efficient, exact solution methods such as me...
Modeling user and topic interactions in social networks using Hawkes processes
We present in this paper a framework to model information diffusion in social networks based on linear multivariate Hawkes processes. Our model exploits the effective broadcasting times of information by users, which gua...
COMER: ClOud-based MEdicine Recommendation
With the development of e-commerce, a growing number of people prefer to purchase medicine online for the sake of convenience. However, it is a serious issue to purchase medicine blindly without necessary medication guid...