A privacy stealing detection method based on behavior-chain for android applications

被引:0
|
作者
Wang, Zhao-Guo [1 ]
Li, Cheng-Long [2 ]
Zhang, Luo-Shi [3 ]
Zhang, Ji-Bao [3 ]
Guan, Yi [1 ]
Xue, Yi-Bo [4 ]
机构
[1] School of Computer Science and Technology, Harbin Institute of Technology, Harbin,Heilongjiang,150006, China
[2] National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing,100029, China
[3] Harbin Univ. of Sci. & Tech., Computer Science & Technology College, Harbin,Heilongjiang,150080, China
[4] Tsinghua National Lab. for Information Sci. & Tech., Beijing,100084, China
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2015年 / 43卷 / 09期
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
10.3969/j.issn.0372-2112.2015.09.011
中图分类号
学科分类号
摘要
Android (operating system) - Android malware
引用
收藏
页码:1750 / 1755
相关论文
共 50 条
  • [1] DroidChain: A Novel Malware Detection Method for Android based on Behavior Chain
    Wang, Zhaoguo
    Li, Chenglong
    Guan, Yi
    Xue, Yibo
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 727 - 728
  • [2] Automatic Detection for Privacy Violations in Android Applications
    Luo, Qian
    Yu, Yinbo
    Liu, Jiajia
    Benslimane, Abderrahim
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6159 - 6172
  • [3] Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications
    Shen, Limin
    Li, Hui
    Wang, Hongyi
    Wang, Yihuan
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [4] PAcT: Detecting and Classifying Privacy Behavior of Android Applications
    Jain, Vijayanta
    Gupta, Sanonda Datta
    Ghanavati, Sepideh
    Peddinti, Sai Teja
    McMillan, Collin
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 104 - 118
  • [5] Towards an Application-Based Notion of Anomalous Privacy Behavior in Android Applications
    AlSobeihy, Modhi M.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [6] Role behavior detection method of privilege escalation attacks for android applications
    Li H.
    Shen L.
    Ma C.
    Liu M.
    International Journal of Performability Engineering, 2019, 15 (06): : 1631 - 1641
  • [7] A SVM-based detection method for electricity stealing behavior of charging pile
    Hong, Huawei
    Su, Yuquan
    Zheng, Peng
    Cheng, Nuo
    Zhang, Jinbo
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 295 - 302
  • [8] Research on Personal Privacy Security Detection Techniques for Android Applications
    Tian, Ye
    Dai, Xin
    Li, Zhijun
    Guo, Hong
    Mao, Xiao
    Li, Yan
    2024 9TH INTERNATIONAL CONFERENCE ON ELECTRONIC TECHNOLOGY AND INFORMATION SCIENCE, ICETIS 2024, 2024, : 375 - 379
  • [9] Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    Fan, Chuan-Yen
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1361 - 1369
  • [10] Privacy Risk Assessment for SQLite Based Android Applications
    Yeh, Kuo-Hui
    Hou, Jia-Li
    Chen, Lin-Chih
    Liao, Hao-Xiang
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1533 - 1541