Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage
DOI: 10.23977/jeis.2017.21007 | Downloads: 6 | Views: 2305
Zheling Zeng 1, Bogang Lin 1, Yitao Ni 1, Yongjia Chen 1
1 Mathematics and computer science college, Fuzhou University
Corresponding AuthorZheling Zeng
Nowadays, leakage of Android private information security is protected by application audit mechanism in formal application store and the Android mobile security mechanism. But because of insufficient of these two security, mechanism leakage of privacy incidents happened frequently. In this paper, we get the sensitive resources permission mapping table and sends the data permission mapping table according to the relationship between resources and permission and characteristics of sensitive resources. The judging rules and the detection process for the malicious application of privacy leakage are developed from these two mapping tables. Finally, 884application samples are tested and the experiment result demonstrates the advantages and disadvantages of the method.
KEYWORDSAndroid system; Malicious application; Detection method; Resource access.
CITE THIS PAPER
Zheling, Z. , Bogang, L. , Yitao, N. , Yongjia, C. (2017) Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage. Journal of Electronics and Information Science (2017) 2: 56-61.
 Symantec. Twentieth Internet Security Threat Report [J]. Financial Computer of China, 2015, (5):95-95.
 Drake JJ, Lanier Z, Mulliner C, et al. Android Hacker's Handbook [J]. 2014.
 Elenkov N. Android Security Internals: An In-Depth Guide to Android's Security Architecture [M]. No Starch Press, 2014.
 Jiang X, Zhou Y. Dissecting Android Malware: Characterization and Evolution[C]// IEEE Symposium on Security & Privacy. IEEE, 2012:95-109.
 Nauman M, Khan S, Zhang X. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints[C]// 5th international symposium on Acm symposium on information, computer and communications security. 2010:328-332.
 Bingquan Xu, Yuan Zhang, Min Yang. GrantDroid: a kind of support Android
 Yubin Wang, Chao Li, Nan Cheng. Research on personal sensitive information protection of Internet [J]. information network security, 2014(9):144-148.WANG Y B, LI C, CHENG N. Research personal sensitive information protection on Internet[J]. Information Network Security, 2014(9):144-148.
 Ker A, Watt S, Myrhaug H I, et al. An ambient, personalized, and context-sensitive information system for mobile users [C]// European Union Symposium on Ambient Intelligence. ACM, 2004.
 Zhang N, Yuan K, Naveed M, et al. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android [J]. 2015:915-930.