Machine learning contributions on the field of security and privacy of android

被引:0
作者
Trad, Aissa [1 ]
Ben Ayed, Hella Kaffel [1 ]
Doggaz, Narjes [1 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, LIPAH Lab, Tunis, Tunisia
来源
2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC | 2022年
关键词
Privacy; PII; Security; Risk assesment; Machine learning;
D O I
10.1109/IWCMC55113.2022.9824950
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, users are storing their data on their smartphones which are connected to the Internet almost permanently. Installed apps request several permissions and therefore access to users' personally identifiable information (PII). This may result to a potential leakage of users PII which is a privacy issue. In recent years, machine learning is contributing to the development of various research fields. In this paper, we show to which extent ML has contributed to the field of security and privacy of android ecosystems. For that we conduct a state of the art that includes studies using ML approaches. Our finding shows that machine learning makes a good contribution to privacy and security. Most of the studies use either supervised learning (classification using mainly support vector) or unsupervised learning ( using mainly agglomerative clustering). Machine learning (ML) is proving its efficiency in classification for protecting privacy in Android ecosystems.
引用
收藏
页码:1131 / 1135
页数:5
相关论文
共 20 条
  • [1] Burkov, 2019, 100 PAGE MACHINE LEA
  • [2] cs cornell, SVM LIGHT SUPPORT VE
  • [3] cs waikato ac, WEK
  • [4] Generating Summary Risk Scores for Mobile Applications
    Gates, Christopher S.
    Li, Ninghui
    Peng, Hao
    Sarma, Bhaskar
    Qi, Yuan
    Potharaju, Rahul
    Nita-Rotaru, Cristina
    Molloy, Ian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (03) : 238 - 251
  • [5] Checking App Behavior Against App Descriptions
    Gorla, Alessandra
    Tavecchia, Ilaria
    Gross, Florian
    Zeller, Andreas
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1025 - 1035
  • [6] DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
    Ikram, Muhammad
    Beaume, Pierrick
    Kaafar, Mohamed Ali
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 211 - 219
  • [7] Jing Y., 2014, P 4 ACM C DATA APPL, P99
  • [8] Lin J., 2014, P 10 S USABLE PRIVAC, P199
  • [9] McCallister E., 2010, SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
  • [10] Merlo A., 2017, SEC