Sciweavers

IJES
2016

Identifying malicious Android apps using permissions and system events

8 years 1 months ago
Identifying malicious Android apps using permissions and system events
: With the popularity of the Android platform, more and more hackers take the Android platform as the profitable target. Android provides a risk communication defence mechanism against malicious applications, which has been demonstrated to be ineffective. It is common to quickly identify malicious applications by permission-based analysis methods. Recently, those permission-based methods are becoming useless when more and more applications request dangerous permissions. The proposed approaches are based on the key insight that the difference in the components trigger model in malware applications and benign applications. The malwares are interested in monitoring system broadcast to activate malicious components and request more permissions. The benign applications are preferable to receive self-define broadcast to activate their components and ask fewer permissions. Existing permission-based Android malware check methods can identify nearly 81% malware samples, but they also identify m...
Hongmu Han, Ruixuan Li, Xiwu Gu
Added 04 Apr 2016
Updated 04 Apr 2016
Type Journal
Year 2016
Where IJES
Authors Hongmu Han, Ruixuan Li, Xiwu Gu
Comments (0)