首页 | 本学科首页   官方微博 | 高级检索  
     


Mining permission patterns for contrasting clean and malicious android applications
Affiliation:1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China;2. University of Chinese Academy of Sciences, Beijing, China
Abstract:An Android application uses a permission system to regulate the access to system resources and users’ privacy-relevant information. Existing works have demonstrated several techniques to study the required permissions declared by the developers, but little attention has been paid towards used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. A benchmark malware dataset and a dataset of 1227 clean applications has been collected by us to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns.
Keywords:Android permission  Data mining  Biclustering  Contrast mining  Permission pattern
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号