Skip to main content
Top
Published in: Energy Systems 3/2022

10-10-2019 | Original Paper

Intent and permission modeling for privacy leakage detection in android

Authors: Gulshan Shrivastava, Prabhat Kumar

Published in: Energy Systems | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The extensive use of android systems in today’s era has led to a growth in malware related issues. This problem is majorly caused because of the open environment of the Android framework which eases the use of third-party applications and allows them to run smoothly on an Android device. Communication between various processes also permits the reprocess of component crosswise process boundaries. This structure enables access to various delicate services within the Android framework. In this paper, we analyze samples of clean and malware applications based on permission and intent modeling. Here we have structured the rule-based mathematical modelling based on permission and intent to identify the untrustworthy permission and intent list.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sharma, K., Gupta, B.B.: Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches. Int. J. E-Serv. Mob. Appl. (IJESMA) 11(2), 1–21 (2019)CrossRef Sharma, K., Gupta, B.B.: Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches. Int. J. E-Serv. Mob. Appl. (IJESMA) 11(2), 1–21 (2019)CrossRef
3.
go back to reference Cam, N. T., Pham, V.H., Nguyen, T.: Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. Cluster Comput., 1–10 (2017) Cam, N. T., Pham, V.H., Nguyen, T.: Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. Cluster Comput., 1–10 (2017)
4.
go back to reference Palumbo, P., Sayfullina, L., Komashinskiy, D., Eirola, E., Karhunen, J.: A pragmatic android malware detection procedure. Comput. Secur. 70, 689–701 (2017)CrossRef Palumbo, P., Sayfullina, L., Komashinskiy, D., Eirola, E., Karhunen, J.: A pragmatic android malware detection procedure. Comput. Secur. 70, 689–701 (2017)CrossRef
5.
go back to reference Shrivastava, G., Kumar, P.: Privacy analysis of android applications: state-of-art and literary assessment. Scalable Comput. Pract. Exp. 18(3), 243–252 (2017) Shrivastava, G., Kumar, P.: Privacy analysis of android applications: state-of-art and literary assessment. Scalable Comput. Pract. Exp. 18(3), 243–252 (2017)
6.
go back to reference Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp 235–245. ACM (2009) Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp 235–245. ACM (2009)
7.
go back to reference Ly, H. T., Nguyen, T. C., Pham, V. H.: eDSDroid: a hybrid approach for information leak detection in android. In: International Conference on Information Science and Applications, pp. 290–297. Springer, Singapore (2017) Ly, H. T., Nguyen, T. C., Pham, V. H.: eDSDroid: a hybrid approach for information leak detection in android. In: International Conference on Information Science and Applications, pp. 290–297. Springer, Singapore (2017)
8.
go back to reference Zhang, L.L., Liang, C.J.M., Li, Z.L., Liu, Y., Zhao, F., Chen, E.: Characterizing privacy risks of mobile apps with sensitivity analysis. IEEE Trans. Mob. Comput. 17(2), 279–292 (2018)CrossRef Zhang, L.L., Liang, C.J.M., Li, Z.L., Liu, Y., Zhao, F., Chen, E.: Characterizing privacy risks of mobile apps with sensitivity analysis. IEEE Trans. Mob. Comput. 17(2), 279–292 (2018)CrossRef
10.
go back to reference Chin, E., Felt, A. P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252. ACM (2011) Chin, E., Felt, A. P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252. ACM (2011)
11.
go back to reference Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical Report TR-2011-04 (2011) Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical Report TR-2011-04 (2011)
12.
go back to reference Chan, P. P., Hui, L. C., & Yiu, S. M.: April). Droidchecker: analyzing android applications for capability leak. In: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp 125–136. ACM (2012) Chan, P. P., Hui, L. C., & Yiu, S. M.: April). Droidchecker: analyzing android applications for capability leak. In: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp 125–136. ACM (2012)
13.
go back to reference Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1043–1054. ACM (2013) Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: Appintent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1043–1054. ACM (2013)
14.
go back to reference Huang, J., Zhang, X., Tan, L., Wang, P., Liang, B.:. Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction. In: Proceedings of the 36th International Conference on Software Engineering, pp. 1036–1046. ACM (2014) Huang, J., Zhang, X., Tan, L., Wang, P., Liang, B.:. Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction. In: Proceedings of the 36th International Conference on Software Engineering, pp. 1036–1046. ACM (2014)
15.
go back to reference Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869–1882 (2014)CrossRef Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869–1882 (2014)CrossRef
16.
go back to reference Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: Covert: compositional analysis of android inter-app permission leakage. IEEE Trans. Softw. Eng. 9, 866–886 (2015)CrossRef Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: Covert: compositional analysis of android inter-app permission leakage. IEEE Trans. Softw. Eng. 9, 866–886 (2015)CrossRef
17.
go back to reference Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Le Traon, Y., Arzt, S., McDaniel, P.: Iccta: Detecting inter-component privacy leaks in android apps. In: Proceedings of the 37th International Conference on Software Engineering-Volume 1, pp. 280–291. IEEE Press (2015) Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Le Traon, Y., Arzt, S., McDaniel, P.: Iccta: Detecting inter-component privacy leaks in android apps. In: Proceedings of the 37th International Conference on Software Engineering-Volume 1, pp. 280–291. IEEE Press (2015)
18.
go back to reference Asăvoae, I. M., Nguyen, H.N., Roggenbach, M., Shaikh, S.: Utilising K Semantics for collusion detection in android applications. In: ter Beek M.H., Gnesi S., Knapp A. (eds.) Critical Systems: Formal Methods and Automated Verification, AVoCS 2016, FMICS 2016. Lecture Notes in Computer Science, vol. 9933, pp. 142–149. Springer, Cham (2016) Asăvoae, I. M., Nguyen, H.N., Roggenbach, M., Shaikh, S.: Utilising K Semantics for collusion detection in android applications. In: ter Beek M.H., Gnesi S., Knapp A. (eds.) Critical Systems: Formal Methods and Automated Verification, AVoCS 2016, FMICS 2016. Lecture Notes in Computer Science, vol. 9933, pp. 142–149. Springer, Cham (2016)
19.
go back to reference Jing, Y., Ahn, G. J., Doupé, A., Yi, J.H.: Checking intent-based communication in android with intent space analysis. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 735-746). ACM (2016) Jing, Y., Ahn, G. J., Doupé, A., Yi, J.H.: Checking intent-based communication in android with intent space analysis. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 735-746). ACM (2016)
20.
go back to reference Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252–1264 (2016)CrossRef Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252–1264 (2016)CrossRef
21.
go back to reference Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: Androdialysis: analysis of android intent effectiveness in malware detection. Comput.Secur. 65, 121–134 (2017)CrossRef Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: Androdialysis: analysis of android intent effectiveness in malware detection. Comput.Secur. 65, 121–134 (2017)CrossRef
22.
go back to reference Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: PIndroid: a novel Android malware detection system using ensemble learning methods. Computers & Security 68, 36–46 (2017)CrossRef Idrees, F., Rajarajan, M., Conti, M., Chen, T.M., Rahulamathavan, Y.: PIndroid: a novel Android malware detection system using ensemble learning methods. Computers & Security 68, 36–46 (2017)CrossRef
23.
go back to reference Sharma, K., Gupta, B.B.: Mitigation and risk factor analysis of android applications. Comput. Electr. Eng. 71, 416–430 (2018)CrossRef Sharma, K., Gupta, B.B.: Mitigation and risk factor analysis of android applications. Comput. Electr. Eng. 71, 416–430 (2018)CrossRef
Metadata
Title
Intent and permission modeling for privacy leakage detection in android
Authors
Gulshan Shrivastava
Prabhat Kumar
Publication date
10-10-2019
Publisher
Springer Berlin Heidelberg
Published in
Energy Systems / Issue 3/2022
Print ISSN: 1868-3967
Electronic ISSN: 1868-3975
DOI
https://doi.org/10.1007/s12667-019-00359-7

Other articles of this Issue 3/2022

Energy Systems 3/2022 Go to the issue