The Evolution of Permission as Feature for Android Malware Detection

被引:6
作者
Gaviria de la Puerta, Jose [1 ]
Sanz, Borja [1 ]
Santos Grueiro, Igor [1 ]
Garcia Bringas, Pablo [1 ]
机构
[1] Univ Deusto, DeustoTech Comp, Bilbao, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Android; Malware; Permissions; Detection; Machine learning;
D O I
10.1007/978-3-319-19713-5_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the last few years, the presence of mobile devices in our lives has increased, offering us almost the same functionality as personal computers. Since the arrival of Android devices, the amount of applications available for this operating system has increased exponentially. Android has become one of the most popular operating systems in these devices. In fact, malware writers insert malicious applications into Android using the Play store and other alternative markets. Lately, many new approaches have been made. Sanz et al., for instance, presented PUMA, a method used to detect malicious apps just by taking a look at the permissions. In this paper, we present the differences between that interesting approach and a newer and bigger dataset. Besides, we also present an evolution in the permissions along the years.
引用
收藏
页码:389 / 400
页数:12
相关论文
共 13 条
[1]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[2]  
Bishop C.M., 2006, Pattern recognition and machine learning, DOI DOI 10.1007/978-0-387-45528-0
[3]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[4]  
Jiang LX, 2007, LECT NOTES ARTIF INT, V4632, P134
[5]  
Kohavi R., 1995, INT JOINT C ART INT, V2, P1137, DOI DOI 10.1067/MOD.2000.109031
[6]  
Ouinlan J.R., 1993, C4 5 PROGRAMS MACHIN
[7]  
Platt JC, 1999, ADVANCES IN KERNEL METHODS, P185
[8]  
Rieck K, 2008, LECT NOTES COMPUT SC, V5137, P108, DOI 10.1007/978-3-540-70542-0_6
[9]  
Salzberg SL, 1994, Mach. Learn, V16, P235, DOI [DOI 10.1007/BF00993309, 10.1007/BF00993309, 10.1007/bf00993309]
[10]  
Sanz B, 2013, ADV INTELL SYST COMP, V189, P289