Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts

2017-04-28
Canbek, Gurol
Baykal, Nazife
SAĞIROĞLU, Şeref
Application permissions at the core of Android security mechanism are the first leading transparent feature for users to assess any mobile application before download or installation and for experts to analyse any malware. Representing vast, dispersed permissions and achieving clarity is not a trivial matter. In this study, we first examined Android permissions, their groups and formal representations with the limitations. We also surveyed limited studies on clustering/visualization of permissions. We grouped 251 Android permissions into 12 clusters semantically and mimed a new visualization approach that looks more conventional to both end users and experts and helps comprehending permissions easily and quickly. We applied the proposed clustering and visualization on calculated discriminative malign permissions concept for malware analysis and demonstrated potential effectiveness of the approach. Our approach improves expressing and understanding of large number of mobile application permissions in a better context, provides more understanding and insight, and helps interpreting or inferring interesting patterns related to permissions for malware classification.

Suggestions

Comparison of classification algorithms for mobile malware detection: market metadata as input source
Baltacı, Nuray; Baykal, Nazife; Acartürk, Cengiz; Department of Information Systems (2014)
The prevalence of mobile devices has been catching the attention of malware authors especially for Android OS supported devices due to its user-centric security policy and open application development strategy for its official application market. In this study, an automated feature-based static analysis method was applied to detect malicious mobile applications on Android devices. The main purpose of the study is to investigate the contribution of other application market metadata to the detection of malici...
UBDroid: a tool for monitoring smartphone application usage for user behavior analysis
Akkurt, Erkam; Temizel, Alptekin; Taşkaya Temizel, Tuğba; Department of Information Systems (2015)
UBDroid is a multilayer tool for monitoring application usage on Android platform. UBDroid consists of an Android client application and a server application. The client application keeps track of user interactions by collecting start and running time of applications and sensor data. The data are collected on the device and subsequently sent to a remote server on a schedule and as a result the system does not require constant network connection. The server application gathers application information such as...
Uses of PKI for process authorization
Taşkazan, Feyza; Özgit, Attila; Erten, Murat; Department of Computer Engineering (2003)
Enterprises require an information security solution that provides privacy, integrity, authentication and access controls for processes. License management systems are developed to be a solution for process authorization in different platforms. However, security threats on processes cannot be controlled with existing license management mechanisms. The need is a complete system that is independent from implementation, platform, and application. In this thesis, we design a complete system for process authoriz...
PLGAKD: A PUF-based Lightweight Group Authentication and Key Distribution Protocol
Yıldız, Hüsnü; Cenk, Murat; Onur, Ertan (Institute of Electrical and Electronics Engineers (IEEE), 2020-11-01)
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this paper is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature per...
Measuring and assesment of well known badpractices in android applications
Sağlam, İsmail Alper; Betin Can, Aysu; Department of Information Systems (2014)
One of the best ways to make a mobile application usable, reputed and high-scored is attention to the requirements like responsiveness, low memory consumption and stability. To meet these requirements developers must improve their codes by avoiding some bad-practices, which cause "Memory-Leaks", "ANR (Application not responding)" and "Out-of-Memory" to satisfy the user's need and make the Android application robust and usable. In this thesis, I developed a tool that detects a set of bad-practices in Android...
Citation Formats
G. Canbek, N. Baykal, and Ş. SAĞIROĞLU, “Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts,” 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/55360.