Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization

被引:4
作者
Wei, Mingkui [1 ]
Gong, Xi [2 ]
Wang, Wenye [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27606 USA
[2] Cisco Syst Inc, Res Triangle Pk, NC 27709 USA
来源
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2015年
关键词
D O I
10.1109/GLOCOM.2015.7417472
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Android is one of the most popular mobile operating systems nowadays, whose popularity, however, also attracts even more crafty developers to develop malicious softwares, or malwares, to exploit illegitimate means for profit. As a basic countermeasure, Android enforces the permission request scheme, in which an application (App) is required to present to the user the system resources (permissions) it will access, and ask user's approval before installation. However, this approach has been proven ineffective as it delegates the whole responsibility of decision-making to the user, who usually lacks the professional knowledge to comprehend the interpretation of a permission. Alternatively, many current researches focus on identifying potential malwares based on attributes of individual Apps, such as inspecting their source code, which, unfortunately, fall in another extreme which tend to make the decision for the user. Nevertheless, from the user's perspective, a satisfactory solution should be an approach which assists users to make the decision of the App installation on their own, by providing them with lucid reasons and requiring minimum professional knowledge. Based on the observation that the description of an App is the most direct interface to communicate its functionality to the user, in this paper we are motivated to explore the relationship between the description and the requested permissions of an App, and further build a model to predict proper permissions based on its description. Our evaluation with Apps collected from the Google Play Market shows that our prediction can achieve as high as 87% accuracy. In this regard, provide a user has full understanding of the description of an App, our model can act as an effective reminder to the user if the App tries to stealthily request permissions that are inconsistent with its description, which is a major character commonly exploited by malwares.
引用
收藏
页数:6
相关论文
共 8 条
  • [1] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
    Barrera, David
    Kayacik, H. Guenes
    van Oorschot, P. C.
    Somayaji, Anil
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
  • [2] Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
  • [3] Permission based Android security: Issues and countermeasures
    Fang, Zheran
    Han, Weili
    Li, Yingjiu
    [J]. COMPUTERS & SECURITY, 2014, 43 : 205 - 218
  • [4] Felt Adrienne Porter, 2012, P 8 S US PRIV SEC
  • [5] Mining Permission Request Patterns from Android and Facebook Applications
    Frank, Mario
    Dong, Ben
    Felt, Adrienne Porter
    Song, Dawn
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, : 870 - 875
  • [6] Peng Hao, 2012, P ACM C COMP COMM SE, P241
  • [7] Wu CG, 2007, J UNIVERS COMPUT SCI, V13, P1471
  • [8] Zhou W., 2012, P 2 ACM C DAT APPL S, P317, DOI DOI 10.1145/2133601.2133640