File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TSE.2017.2730198
- Scopus: eid_2-s2.0-85028931155
- WOS: WOS:000444842700002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy
Title | Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy |
---|---|
Authors | |
Keywords | privacy policy Mobile applications |
Issue Date | 2018 |
Citation | IEEE Transactions on Software Engineering, 2018, v. 44, n. 9, p. 834-854 How to Cite? |
Abstract | Since more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps. As malware is becoming more complicated and stealthy, recent research proposed a promising detection approach that looks for the inconsistency between an app's permissions and its description. In this paper, we first revisit this approach and reveal that using description and permission will lead to many false positives because descriptions often fail to declare all sensitive operations. Then, we propose exploiting an app's privacy policy and its bytecode to enhance the malware detection based on description and permissions. It is non-trivial to automatically analyze privacy policy and perform the cross-verification among these four kinds of software artifacts including, privacy policy, bytecode, description, and permissions. To address these challenging issues, we first propose a novel data flow model for analyzing privacy policy, and then develop a new system, named TAPVerifier, for carrying out investigation of individual software artifacts and conducting the cross-verification. The experimental results show that TAPVerifier can analyze privacy policy with a high accuracy and recall rate. More importantly, integrating privacy policy and bytecode level information can remove up to 59.4 percent false alerts of the state-of-the-art systems, such as AutoCog, CHABADA, etc. |
Persistent Identifier | http://hdl.handle.net/10722/303537 |
ISSN | 2023 Impact Factor: 6.5 2023 SCImago Journal Rankings: 1.868 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Le | - |
dc.contributor.author | Luo, Xiapu | - |
dc.contributor.author | Qian, Chenxiong | - |
dc.contributor.author | Wang, Shuai | - |
dc.contributor.author | Leung, Hareton K.N. | - |
dc.date.accessioned | 2021-09-15T08:25:31Z | - |
dc.date.available | 2021-09-15T08:25:31Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | IEEE Transactions on Software Engineering, 2018, v. 44, n. 9, p. 834-854 | - |
dc.identifier.issn | 0098-5589 | - |
dc.identifier.uri | http://hdl.handle.net/10722/303537 | - |
dc.description.abstract | Since more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps. As malware is becoming more complicated and stealthy, recent research proposed a promising detection approach that looks for the inconsistency between an app's permissions and its description. In this paper, we first revisit this approach and reveal that using description and permission will lead to many false positives because descriptions often fail to declare all sensitive operations. Then, we propose exploiting an app's privacy policy and its bytecode to enhance the malware detection based on description and permissions. It is non-trivial to automatically analyze privacy policy and perform the cross-verification among these four kinds of software artifacts including, privacy policy, bytecode, description, and permissions. To address these challenging issues, we first propose a novel data flow model for analyzing privacy policy, and then develop a new system, named TAPVerifier, for carrying out investigation of individual software artifacts and conducting the cross-verification. The experimental results show that TAPVerifier can analyze privacy policy with a high accuracy and recall rate. More importantly, integrating privacy policy and bytecode level information can remove up to 59.4 percent false alerts of the state-of-the-art systems, such as AutoCog, CHABADA, etc. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Software Engineering | - |
dc.subject | privacy policy | - |
dc.subject | Mobile applications | - |
dc.title | Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TSE.2017.2730198 | - |
dc.identifier.scopus | eid_2-s2.0-85028931155 | - |
dc.identifier.volume | 44 | - |
dc.identifier.issue | 9 | - |
dc.identifier.spage | 834 | - |
dc.identifier.epage | 854 | - |
dc.identifier.eissn | 1939-3520 | - |
dc.identifier.isi | WOS:000444842700002 | - |