Abstract
Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout.
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded
The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study.






Similar content being viewed by others
References
Arxan (2012) State of Security in the App Economy: Mobile Apps under Attack
Barrera D et al (2010) A methodology for empirical analysis of permission-based security models and its application to android. Proceedings of the 17th ACM conference on Computer and communications security. ACM
Chandramohan M, Tan HBK (2012) Detection of moblie malware in the wild. Computer 45(9)
Chandramohan M, Tan HBK (2012) Detection of moblie malware in the wild. Computer 45(9)
Enck W et al (2009) Understanding android security. IEEE Security & Privacy Magazine 7(1):50–57
Enck W, et al (2011) A Study of Android Application Security. Proc. 20th USENIX Conf. Security, Security
F-Secure. Threat description: Trojan:android/droidkungfu.c. Available: http://www.f-secure.com/v-descs/trojan_android_droidkungfu_c.shtml. Accessed 15.02.10
F-Secure. Threat description: Trojan:android/ginmaster.a. http://www.f-secure.com/v-descs/trojan_android_ginmaster_a.shtml. Accessed 15.02.10
F-Secure. Threat description: Trojan-downloader:osx/ashback.c http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_c.shtml. Accessed 15.02.10.
F-Secure. Threat description: Virus:boot/brain. http://www.f-secure.com/v-descs/brain.shtml. Accessed 15.02.10.
Felt AP et al (2011) Android Permissions Demystified. Proc. 18th ACM Conf Comput Commun Security (CCS)
F-Secure (2014) Mobile threat report
McAfee (2012) McAfee Threats Report: First Quarter 2012
Moser A, Kruegel C, Kirda E (2007) Exploring Multiple Execution Paths for Malware Analysis. Proc. IEEE Symp. Security Privacy, SP, pp 231–245
Shabtai A et al (2009) Google Android: A State-of-the-art Review of Security Mechanisms. Technical Report. Cornell University
Xu R, Saidi H Anderson R (2012) Aurasium: Practical Policy Enforcement for Android Applications. 21st USENIX Security Symp. USENIX
Yan LK, Yin H (2012) DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. Proc 21st USENIX conf. Security Symp., Security
Zhou Y, Jiang X (2012) Dissecting Android Malware: Characterization and Evolution. Proc 33rd IEEE Symp Security and Privacy
Acknowledgments
This work was supported by the ICT R&D program of MSIP/IITP, Republic of Korea. [13-912-06-003, Development of Mobile S/W Security Testing Tools for Detecting New Vulnerabilities of Android]
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ju, Sh., Seo, Hs. & Kwak, J. Research on android malware permission pattern using permission monitoring system. Multimed Tools Appl 75, 14807–14817 (2016). https://doi.org/10.1007/s11042-016-3273-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3273-x