메뉴 건너뛰기




Volumn 9, Issue 11, 2014, Pages 1828-1842

Permission use analysis for vetting undesirable behaviors in android apps

Author keywords

Android behavior representation; Android security; Permission use analysis; Vetting undesirable behaviors

Indexed keywords

ANDROID APPS; ANDROID SECURITIES; BEHAVIOR REPRESENTATION; PERMISSION USE ANALYSIS; VETTING UNDESIRABLE BEHAVIORS;

EID: 84908068169     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2347206     Document Type: Article
Times cited : (34)

References (64)
  • 1
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones
    • W. Enck et al., "TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones," in Proc. 9th USENIX Conf. OSDI, pp. 1-6, 2010.
    • (2010) Proc. 9th USENIX Conf. OSDI , pp. 1-6
    • Enck, W.1
  • 3
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to Android
    • D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to Android," in Proc. 17th ACM CCS, 2010, pp. 73-84.
    • Proc. 17th ACM CCS, 2010 , pp. 73-84
    • Barrera, D.1    Kayacik, H.G.2    Van Oorschot, P.C.3    Somayaji, A.4
  • 4
    • 84908080571 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • Mcafee Threats Report: Third Quarter 2012. [Online]. Available: http://www.mcafee.com/ca/resources/reports/rp-quarterly-threat-q3-2012.pdf, accessed May 7, 2013.
    • Mcafee Threats Report: Third Quarter 2012. [Online]
  • 14
    • 84860630143 scopus 로고    scopus 로고
    • Shadow attacks: Automatically evading system-call-behavior based malware detection
    • May
    • W. Ma, P. Duan, S. Liu, G. Gu, and J.-C. Liu, "Shadow attacks: Automatically evading system-call-behavior based malware detection," J. Comput. Virol., vol. 8, nos. 1-2, pp. 1-13, May 2012.
    • (2012) J. Comput. Virol. , vol.8 , Issue.1-2 , pp. 1-13
    • Ma, W.1    Duan, P.2    Liu, S.3    Gu, G.4    Liu, J.-C.5
  • 15
    • 60049085302 scopus 로고    scopus 로고
    • Understanding Android security
    • Jan./Feb.
    • W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android security," IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 17
    • 84908074644 scopus 로고    scopus 로고
    • Available
    • (2011). Apple: iOS 4. [Online]. Available: http://www.apple.com/iphone
    • (2011) Apple: IOS 4. [Online]
  • 18
    • 84908076832 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • Android Permissions. [Online]. Available: http://developer.android.com/reference/android/Manifest.permission.html, accessed May 7, 2013.
    • Android Permissions. [Online]
  • 19
    • 84889068951 scopus 로고    scopus 로고
    • Vetting undesirable behaviors in Android apps with permission use analysis
    • Y. Zhang et al., "Vetting undesirable behaviors in Android apps with permission use analysis," in Proc. ACM SIGSAC Conf. CCS, 2013, pp. 611-622.
    • Proc. ACM SIGSAC Conf. CCS, 2013 , pp. 611-622
    • Zhang, Y.1
  • 20
    • 84889041424 scopus 로고    scopus 로고
    • AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection
    • Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang, "AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection," in Proc. ACM SIGSAC Conf. CCS, 2013, pp. 1043-1054.
    • Proc. ACM SIGSAC Conf. CCS, 2013 , pp. 1043-1054
    • Yang, Z.1    Yang, M.2    Zhang, Y.3    Gu, G.4    Ning, P.5    Wang, X.S.6
  • 22
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis
    • L. K. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis," in Proc. USENIX Security Symp., 2012, pp. 569-584.
    • Proc. USENIX Security Symp., 2012 , pp. 569-584
    • Yan, L.K.1    Yin, H.2
  • 23
    • 84910620092 scopus 로고    scopus 로고
    • Contextual policy enforcement in Android applications with permission event graphs
    • K. Z. Chen et al., "Contextual policy enforcement in Android applications with permission event graphs," in Proc. NDSS, Feb. 2013.
    • Proc. NDSS, Feb. 2013
    • Chen, K.Z.1
  • 26
    • 84908076825 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • Pendingintent. [Online]. Available: http://developer.android.com/reference/android/app/PendingIntent.html, accessed May 7, 2013.
    • Pendingintent. [Online]
  • 27
    • 84870819587 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • Ui/Application Exerciser Monkey. [Online]. Available: http://developer.android.com/tools/help/monkey.html, accessed May 7, 2013.
    • Ui/Application Exerciser Monkey. [Online]
  • 28
    • 84930525327 scopus 로고    scopus 로고
    • A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors
    • A. Reina, A. Fattori, and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors," in Proc. EuroSec, Apr. 2013.
    • Proc. EuroSec, Apr. 2013
    • Reina, A.1    Fattori, A.2    Cavallaro, L.3
  • 29
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting Android malware: Characterization and evolution
    • Y. Zhou and X. Jiang, "Dissecting Android malware: Characterization and evolution," in Proc. IEEE Symp. SP, May 2012, pp. 95-109.
    • Proc. IEEE Symp. SP, May 2012 , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 31
    • 84893082487 scopus 로고    scopus 로고
    • Defeating mTANs for profit - Part one
    • Apr.
    • A. Apvrille and K. Yang, "Defeating mTANs for profit - Part one," Virus Bull. Mag., vol. 7, no. 4, pp. 4-10, Apr. 2011.
    • (2011) Virus Bull. Mag. , vol.7 , Issue.4 , pp. 4-10
    • Apvrille, A.1    Yang, K.2
  • 34
    • 84908076821 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • Android.SMSReplicator. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2010-110214%-1252-99, accessed May 7, 2013.
    • Android.SMSReplicator. [Online]
  • 36
    • 84908067636 scopus 로고    scopus 로고
    • Available: accessed May 7, 2013
    • ZeuS-in-the-Mobile - Facts and Theories. [Online]. Available: http://www.securelist.com/en/analysis/204792194/ZeuS-in-the-Mobile-Fact-and-Theories, accessed May 7, 2013.
    • ZeuS-in-the-Mobile - Facts and Theories. [Online]
  • 38
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • L. Cavallaro, P. Saxena, and R. Sekar, "On the limits of information flow techniques for malware analysis and containment," in Proc. 5th Int. Conf. DIMVA, Jul. 2008, pp. 143-163.
    • Proc. 5th Int. Conf. DIMVA, Jul. 2008 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 39
    • 84887633886 scopus 로고    scopus 로고
    • On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
    • G. Sarwar, O. Mehani, R. Boreli, and D. Kaafar, "On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices," in Proc. 10th Int. Conf. SECRYPT, 2013, pp. 461-467.
    • Proc. 10th Int. Conf. SECRYPT, 2013 , pp. 461-467
    • Sarwar, G.1    Mehani, O.2    Boreli, R.3    Kaafar, D.4
  • 40
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock Android smartphones
    • M. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock Android smartphones," in Proc. NDSS, 2012.
    • Proc. NDSS, 2012
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 41
    • 84874865861 scopus 로고    scopus 로고
    • AppsPlayground: Automatic security analysis of smartphone applications
    • V. Rastogi, Y. Chen, and W. Enck, "AppsPlayground: Automatic security analysis of smartphone applications," in Proc. 3rd ACM Conf. CODASPY, 2013, pp. 209-220.
    • Proc. 3rd ACM Conf. CODASPY, 2013 , pp. 209-220
    • Rastogi, V.1    Chen, Y.2    Enck, W.3
  • 45
    • 38149096122 scopus 로고    scopus 로고
    • A forced sampled execution approach to kernel rootkit identification
    • J. Wilhelm and T.-C. Chiueh, "A forced sampled execution approach to kernel rootkit identification," in Proc. 10th Int. Conf. RAID, 2007, pp. 219-235.
    • Proc. 10th Int. Conf. RAID, 2007 , pp. 219-235
    • Wilhelm, J.1    Chiueh, T.-C.2
  • 46
    • 84869435137 scopus 로고    scopus 로고
    • PeerPress: Utilizing enemies' P2P strength against them
    • Z. Xu, L. Chen, G. Gu, and C. Kruegel, "PeerPress: Utilizing enemies' P2P strength against them," in Proc. ACM Conf. CCS, 2012, pp. 581-592.
    • Proc. ACM Conf. CCS, 2012 , pp. 581-592
    • Xu, Z.1    Chen, L.2    Gu, G.3    Kruegel, C.4
  • 49
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets," in Proc. NDSS, 2012.
    • Proc. NDSS, 2012
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4
  • 53
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang, "Apex: Extending Android permission model and enforcement with user-defined runtime constraints," in Proc. 5th ASIACCS, 2010, pp. 328-332.
    • Proc. 5th ASIACCS, 2010 , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 55
    • 84888310280 scopus 로고    scopus 로고
    • Practical context-aware permission control for hybrid mobile applications
    • K. Singh, "Practical context-aware permission control for hybrid mobile applications," in Proc. 16th Int. Symp. RAID, Oct. 2013, pp. 307-327.
    • Proc. 16th Int. Symp. RAID, Oct. 2013 , pp. 307-327
    • Singh, K.1
  • 56
    • 84874835750 scopus 로고    scopus 로고
    • AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users
    • S. Rosen, Z. Qian, and Z. M. Mao, "AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users," in Proc. 3rd ACM CODASPY, 2013, pp. 221-232.
    • Proc. 3rd ACM CODASPY, 2013 , pp. 221-232
    • Rosen, S.1    Qian, Z.2    Mao, Z.M.3
  • 57
    • 85019170256 scopus 로고    scopus 로고
    • WHYPER: Towards automating risk assessment of mobile applications
    • Aug.
    • R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, "WHYPER: Towards automating risk assessment of mobile applications," in Proc. USENIX Security Symp., pp. 527-542, Aug. 2013.
    • (2013) Proc. USENIX Security Symp. , pp. 527-542
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 58
    • 84874080269 scopus 로고    scopus 로고
    • Mining permission request patterns from Android and Facebook applications
    • M. Frank, B. Dong, A. P. Felt, and D. Song, "Mining permission request patterns from Android and Facebook applications," in Proc. IEEE 12th ICDM, Dec. 2012, pp. 870-875.
    • Proc. IEEE 12th ICDM, Dec. 2012 , pp. 870-875
    • Frank, M.1    Dong, B.2    Felt, A.P.3    Song, D.4
  • 59
    • 84869432690 scopus 로고    scopus 로고
    • Using probabilistic generative models for ranking risks of Android apps
    • H. Peng et al., "Using probabilistic generative models for ranking risks of Android apps," in Proc. ACM CCS, 2012, pp. 241-252.
    • Proc. ACM CCS, 2012 , pp. 241-252
    • Peng, H.1
  • 62
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: Statically vetting Android apps for component hijacking vulnerabilities
    • L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities," in Proc. ACM Conf. CCS, 2012, pp. 229-240.
    • Proc. ACM Conf. CCS, 2012 , pp. 229-240
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 63


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.