Abstract
The increasing market share of the Android platform is partly caused by a growing number of applications (apps) available on the Android market: by now (January 2011) roughly 200.000. This popularity in combination with the lax market approval process attracts the injection of malicious apps into the market. Android features a fine-grained permission system allowing the user to review the permissions an app requests and grant or deny access to resources prior to installation. In this paper, we extract these security permissions along other metadata of 130.211 apps and apply a new analysis method called Activation Patterns. Thereby, we are able to gain a new understanding of the apps through extracting knowledge about security permissions, their relations and possible anomalies, executing semantic search queries, finding relations between the description and the employed security permissions, or identifying clusters of similar apps. The paper describes the employed method and highlights its benefits in several analysis examples – e.g. screening the market for possible malicious apps that should be further investigated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Crestani, F.: Application of spreading activation techniques in information retrieval. Artificial Intelligence Review 11(6), 453–482 (1997)
Fritzke, B.: A growing neural gas learns topologies. Advances in Neural Information Processing Systems (1), 1211–1216 (2005)
Lackner, G., Teufl, P., Weinberger, R.: User Tracking Based on Behavioral Fingerprints. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 76–95. Springer, Heidelberg (2010)
Qin, A.K., Suganthan, P.N.: Robust growing neural gas algorithm with application in cluster analysis. Neural Netw. 17(8-9), 1135–1148 (2004)
Quillian, M.R.: Semantic Memory, vol. 2, ch.10, pp. 227–270. MIT Press (1968)
Teufl, P., Lackner, G.: RDF Data Analysis with Activation Patterns. In: Und Hermann Maurer, K.T. (ed.) Proceedings of the 10th International Conference on Knowledge Management and Knowledge Technologies, iKNOW 2010 Graz Austria, Journal of Computer Science (2010)
Teufl, P., Payer, U., Fellner, R.: Event correlation on the basis of activation patterns. In: Proceedings of the 18th Euromicro Conference on Parallel Distributed and NetworkBased Processing, PDP 2010, pp. 631–640 (2010)
Teufl, P., Payer, U., Parycek, P.: Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning. In: Macintosh, A., Tambouris, E. (eds.) ePart 2009. LNCS, vol. 5694, pp. 139–150. Springer, Heidelberg (2009)
Toninelli, A., Montanari, R., Lassila, O., Khushraj, D.: What’s on Users’ Minds? Toward a Usable Smart Phone Security Model. IEEE Pervasive Computing 8(2), 32–39 (2009)
Vennon, T., Stroop, D.: Android Market: Threat Analysis of the Android Market (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Teufl, P. et al. (2012). Android Market Analysis with Activation Patterns. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-30244-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30243-5
Online ISBN: 978-3-642-30244-2
eBook Packages: Computer ScienceComputer Science (R0)