An Automated Permission Selection Framework for Android Platform

被引:0
作者
Toqeer Ali
Yasar Khan
Tamleek Ali
Safiullah Faizullah
Turki Alghamdi
Sajid Anwar
机构
[1] Isalmic University of Madinah,Faculty of Computer and Information System
[2] Universiti Kuala Lumpur,Malaysian Institute of Information Technology
[3] Institute of Management Sceinces,undefined
来源
Journal of Grid Computing | 2020年 / 18卷
关键词
Android; Android permisions; Android security; Smartphone security; Operating system; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
Enhancements to Android security frameworks have been a focal point of the research community in the past few years due to Android’s growing popularity. The Android permission framework performs a vital role in identifying the malicious behavior of an application. Most malware utilizes the wrong permission, given by an application that exploits device security and privacy. The focus point should be managing the permission given to an application at the very beginning, when installing the application. However, in this regard, the solutions given so far are user-centric. That means the user needs to decide whether permission should be given or not. A novice user usually ignores the warnings during installation of an app or accessing a resource. In this research, we introduce an enhanced Android permission framework that automatically decides for the user which permissions should be given to application at installation or when resources are accessed in the newer Android versions. We generated a large dataset of permissions and their ratings to generate a machine learning model. Finally, an incorporated machine learning model automatically decides on behalf of a user which permissions should be given to the user. Our results show high accuracy in the auto-selection of suggested permissions for the end user.
引用
收藏
页码:547 / 561
页数:14
相关论文
共 20 条
  • [1] Enck W(2009)Understanding android security IEEE Secur. Priv. 50 50-57
  • [2] Ongtang M(2012)Dynamic behaviors of memristor-based recurrent neural networks with time-varying delays Neural Netw. 36 1-10
  • [3] McDaniel P(2013)Gamifying learning experiences: practical implications and outcomes Comput. Educ. 63 380-392
  • [4] Wu A(2014)TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones ACM Transactions on Computer Systems (TOCS) 32 5-undefined
  • [5] Zeng Z(undefined)undefined undefined undefined undefined-undefined
  • [6] Domínguez A(undefined)undefined undefined undefined undefined-undefined
  • [7] Saenz-De-Navarrete J(undefined)undefined undefined undefined undefined-undefined
  • [8] De-Marcos L(undefined)undefined undefined undefined undefined-undefined
  • [9] FernáNdez-Sanz L(undefined)undefined undefined undefined undefined-undefined
  • [10] PagéS C(undefined)undefined undefined undefined undefined-undefined