DroidProtector: Preventing Capability Leak of Android Applications

被引:1
作者
Sun, Jiyuan [1 ,2 ]
Ye, Shaozhen [1 ]
Liu, Jianwei [2 ]
Shang, Tao [2 ]
Lei, Qi [3 ]
机构
[1] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Fujian, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Fuzhou Univ, Coll Phys & Informat Engn, Fuzhou, Fujian, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI) | 2017年
基金
中国国家自然科学基金;
关键词
Android Applications; Capability Leaks; Feature Selection; Markov blanket; Security;
D O I
10.1109/ICGI.2017.14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Bolh benign and malicious developers arc attracted to Android platform because anyone is allowed to publish applications on the Android market. Such capability leak vulnerability on the Android platform may lead to permission elevation and privacy disclosure by making malware bypass Android security mechanism. This paper presents a code scanner tool Droidprotcctor which is applied to help developers search bugs and focus on the business of applications rather than the security problems. Firstly, Markov blanket is used for feature selection. Secondly, source code is analyzed by a machine-leaning method. Finally, malicious intents and capability leaks are detected. By collecting 3482 applications and 59 source files to learn Markov blanket as the feature set and testing this code scanner tool, the experimental results show that DroidProtector can detect the vulnerability of Android source code effectively by using Markov blanket to select features correctly.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 21 条
[1]  
[Anonymous], 1998, STAT LEARNING THEORY
[2]  
[Anonymous], 2012, DOCUMENTATION EVALUA
[3]  
[Anonymous], SMARTPH OS MARK SHAR
[4]  
[Anonymous], 2012, Proceedings of the fth ACM conference on Security and Privacy in Wireless and Mobile Networks
[5]  
[Anonymous], 2012, P 10 INT C MOB SYST
[6]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[7]  
Aslam H A S, 2014, INTERAPPLICATION COM
[8]  
Avancini A, 2013, 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), P57, DOI 10.1109/IWAST.2013.6595792
[9]  
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018
[10]  
Eisenhaur G., 2011, BLACK HAT 2011 C