An Effective Risk Computation Metric for Android Malware Detection
Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 4
Abstract
Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions. Therefore, a systematic user assistance mechanism for making appropriate decisions can significantly improve the security of Android based devices by preventing malicious apps installation. However, the criticality of permissions and the security risk values of apps are not well determined for users in order to make correct decisions. In this study, a new metric is introduced for effective risk computation of untrusted apps based on their required permissions. The metric leverages both frequency of permission usage in malwares and rarity of them in normal apps. Based on the proposed metric, an algorithm is developed and implemented for identifying critical permissions and effective risk computation. The proposed solution can be directly used by the mobile owners to make better decisions or by Android markets to filter out suspicious apps for further examination. Empirical evaluations on real malicious and normal app samples show that the proposed metric has high malware detection rate and is superior to recently proposed risk score measurements. Moreover, it has good performance on unseen apps in term of security risk computation.
Authors and Affiliations
Mahmood Deypir, Ehsan Sharifi
Enhancing Efficiency of Software Fault Tolerance Techniques in Satellite Motion System
This research shows the influence of using multi-core architecture to reduce the execution time and thus increase performance of some software fault tolerance techniques. According to superiority of N-version Programming...
EBG Structures Properties and their Application to Improve Radiation of a Low Profile Antenna
In this paper we have studied the characteristics of mushroom-like Electromagnetic Band Gap (EBG) structure and performance of a low profile antenna over it. Afterward, a novel EBG surface is presented by some modificati...
Coverage Improving with Energy Efficient in Wireless Sensor Networks
Wireless sensor networks (WSNs) are formed by numerous sensors nodes that are able to sense different environmental phenomena and to transfer the collected data to the sink. The coverage of a network is one of the main d...
A Stochastic Lyapunov Theorem with Application to Stability Analysis of Networked Control Systems
The source of randomness in stochastic systems is an input with stochastic behavior as treated in the existing literature. Special types of stochastic processes such as the Wiener process or the Brownian motion have serv...
A New Switched-beam Setup for Adaptive Antenna Array Beamforming
In this paper, a new spatio-temporal based approach is proposed which improves the speed and performance of temporal-based algorithms, conventional Least Mean Square (LMS), Normalized LMS (NLMS) and Variable Step-size LM...