A privacy stealing detection method based on behavior-chain for android applications

被引:0
作者
Wang, Zhao-Guo [1 ]
Li, Cheng-Long [2 ]
Zhang, Luo-Shi [3 ]
Zhang, Ji-Bao [3 ]
Guan, Yi [1 ]
Xue, Yi-Bo [4 ]
机构
[1] School of Computer Science and Technology, Harbin Institute of Technology, Harbin, 150006, Heilongjiang
[2] National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing
[3] Harbin Univ. of Sci. & Tech., Computer Science & Technology College, Harbin, 150080, Heilongjiang
[4] Tsinghua National Lab. for Information Sci. & Tech., Beijing
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2015年 / 43卷 / 09期
关键词
Android system; Behavior chain; Malware detection; Privacy leakage;
D O I
10.3969/j.issn.0372-2112.2015.09.011
中图分类号
学科分类号
摘要
The increasing presence of Android privacy leakages poses a significant privacy risk for Android smartphone users. This paper proposes a privacy leakage detection method based on behavior chain, which can achieve the fine-grained location of the source and points of the information leakage. With the WxShall algorithm, we can calculate the accessibility between the leakage source and leakage points, and detect the transfer path of privacy in Android applications. The detections of 1259 Android applications show that the accuracy of this algorithm reaches 95.1% and the complexity accounts for 5.45% of WarShall algorithm. The results of the experiments demonstrate that the method is better than Androgurad and Kirin. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1750 / 1755
页数:5
相关论文
共 39 条
[21]   Android malicious behavior recognition and classification method based on random forest algorithm [J].
Ke D.-X. ;
Pan L.-M. ;
Luo S.-L. ;
Zhang H.-Q. .
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (10) :2013-2023
[22]   An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network [J].
Li, Qingru ;
Zhang, Yufei ;
Wang, Fangwei ;
Wang, Changguang .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT III, 2024, 14489 :344-357
[23]   DeepMDFC: A deep learning based android malware detection and family classification method [J].
Sharma, Sandeep ;
Ahlawat, Prachi ;
Khanna, Kavita .
SECURITY AND PRIVACY, 2024, 7 (02)
[24]   Permission-Based Feature Scaling Method for Lightweight Android Malware Detection [J].
Zhu, Dali ;
Xi, Tong .
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT I, 2019, 11775 :714-725
[25]   CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications [J].
Mishra, Preeti ;
Jain, Tanmay ;
Aggarwal, Palak ;
Paul, Gunjan ;
Gupta, Brij B. ;
Attar, Razaz Waheeb ;
Gaurav, Akshat .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
[26]   Android Malware Detection Method Based on Frequent Pattern and Weighted Naive Bayes [J].
Li, Jingwei ;
Wu, Bozhi ;
Wen, Weiping .
CYBER SECURITY, CNCERT 2018, 2019, 970 :36-51
[27]   A detection method for android application security based on TF-IDF and machine learning [J].
Yuan, Hongli ;
Tang, Yongchuan ;
Sun, Wenjuan ;
Liu, Li .
PLOS ONE, 2020, 15 (09)
[28]   A new machine learning-based method for android malware detection on imbalanced dataset [J].
Diyana Tehrany Dehkordy ;
Abbas Rasoolzadegan .
Multimedia Tools and Applications, 2021, 80 :24533-24554
[29]   A new machine learning-based method for android malware detection on imbalanced dataset [J].
Dehkordy, Diyana Tehrany ;
Rasoolzadegan, Abbas .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) :24533-24554
[30]   A static Android malicious code detection method based on multi-source fusion [J].
Du, Yao ;
Wang, Xiaoqing ;
Wang, Junfeng .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) :3238-3246