An Android application risk evaluation framework based on minimum permission set identification

被引:20
作者
Xiao, Jianmao [1 ]
Chen, Shizhan [1 ]
He, Qiang [2 ]
Feng, Zhiyong [1 ]
Xue, Xiao [1 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin, Peoples R China
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic 3122, Australia
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Permission overprivilege; App risk evaluation; Minimum permissions; Static analysis; Collaborative filtering;
D O I
10.1016/j.jss.2020.110533
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Android utilizes a security mechanism that requires apps to request permission for accessing sensitive user data, e.g., contacts and SMSs, or certain system features, e.g., camera and Internet access. However, Android apps tend to be overprivileged, i.e., they often request more permissions than necessary. This raises the security problem of overprivilege. To alleviate the overprivilege problem, this paper proposes MPDroid, an approach that combines static analysis and collaborative filtering to identify the minimum permissions for an Android app based on its app description and API usage. Given an app, MPDroid first employs collaborative filtering to identify the initial minimum permissions for the app. Then, through static analysis, the final minimum permissions that an app really needs are identified. Finally, it evaluates the overprivilege risk by inspecting the app's extra privileges, i.e., the unnecessary permissions requested by the app. Experiments are conducted on 16,343 popular apps collected from Google Play. The results show that MPDroid outperforms the state-of-the-art approach significantly. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:17
相关论文
共 33 条
[1]   SoK: Lessons Learned From Android Security Research For Appified Software Platforms [J].
Acar, Yasemin ;
Backes, Michael ;
Bugiel, Sven ;
Fahl, Sascha ;
McDaniel, Patrick ;
Smith, Matthew .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :433-451
[2]  
Algarni A., 2014, International Journal of Computer, Information Science and Engineering, P71
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], 2011, PROC 1 ACM WORKSHOP, DOI DOI 10.1145/2046614.2046618
[5]  
Au K.W.Y., 2012, ACM C COMPUTER COMMU, P217
[6]  
Backes M, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1101
[7]   Automated Android application permission recommendation [J].
Bao, Lingfeng ;
Lo, David ;
Xia, Xin ;
Li, Shanping .
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (09)
[8]   What Permissions Should This Android App Request? [J].
Bao, Lingfeng ;
Lo, David ;
Xia, Xin ;
Li, Shanping .
2016 INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, TESTING AND EVOLUTION (SATE 2016), 2016, :36-41
[9]  
Bartel A, 2012, IEEE INT CONF AUTOM, P274, DOI 10.1145/2351676.2351722
[10]  
Bin Liu, 2016, Proceedings of SOUPS 2016: Twelfth Symposium on Usable Privacy and Security. SOUPS 2016, P27