Skip to main content

The Evolution of Permission as Feature for Android Malware Detection

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Abstract

Over the last few years, the presence of mobile devices in our lives has increased, offering us almost the same functionality as personal computers. Since the arrival of Android devices, the amount of applications available for this operating system has increased exponentially. Android has become one of the most popular operating systems in these devices. In fact, malware writers insert malicious applications into Android using the Play store and other alternative markets. Lately, many new approaches have been made. Sanz et al., for instance, presented PUMA, a method used to detect malicious apps just by taking a look at the permissions. In this paper, we present the differences between that interesting approach and a newer and bigger dataset. Besides, we also present an evolution in the permissions along the years.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.apple.com/iphone/features/app-store.html.

  2. 2.

    http://www.statista.com.

  3. 3.

    http://online.wsj.com/public/resources/documents/wsj-2009-0731-FCCApple.pdf.

  4. 4.

    http://www.virustotal.com.

  5. 5.

    http://code.google.com/p/android-market-api/.

  6. 6.

    http://docs.seleniumhq.org/.

  7. 7.

    http://apify.ifc0nfig.com/.

  8. 8.

    Adware is a type of action hidden in applications, which send targeted advertisements to our device when you run an application.

  9. 9.

    http://www.cs.waikato.ac.nz/ml/weka/.

References

  1. Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of 2001 IEEE Symposium on Security and Privacy, S&P 2001, pp. 38–49. IEEE (2001)

    Google Scholar 

  2. Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, pp. 108–125 (2008)

    Google Scholar 

  3. Tian, R., Batten, L., Islam, M., Versteeg, S.: An automated classification system based on the strings of trojan and virus families. In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 23–30. IEEE (2009)

    Google Scholar 

  4. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., Álvarez, G.: Puma: permission usage to detect malware in android. In: International Joint Conference CISIS’12-ICEUTE’ 12-SOCO’ 12 Special Sessions, pp. 289–298. Springer (2013)

    Google Scholar 

  5. Arp, D., Spreitzenbarth, M., Hübner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS (2014)

    Google Scholar 

  6. Bishop, C.M., et al.: Pattern Recognition and Machine Learning, vol. 4. Springer, New York (2006)

    Google Scholar 

  7. Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. IJCAI 14, 1137–1145 (1995)

    Google Scholar 

  8. Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. Int. J. Comput. Appl. Technol. 35(2009), 183–193 (2009)

    Article  Google Scholar 

  9. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). doi:10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  10. Quinlan, J.: C4. 5: Programs for Machine Learning. Morgan kaufmann (1993)

    Google Scholar 

  11. Salzberg, S.L.: C4.5: programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, inc., 1993. Mach. Learn. 16, 235–240 (1994). doi:10.1007/BF00993309

  12. Jiang, L., Wang, D., Cai, Z., Yan, X.: Survey of improving naive bayes for classification. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O. (eds.) Advanced Data Mining and Applications. Lecture Notes in Computer Science, Vol. 4632, pp. 134–145. Springer, Berlin/Heidelberg (2007)doi:10.1007/978-3-540-73871-8_14

  13. Platt, J.C.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to José Gaviria de la Puerta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

de la Puerta, J., Sanz, B., Santos Grueiro, I., Bringas, P.G. (2015). The Evolution of Permission as Feature for Android Malware Detection. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics