Android application behavioural analysis for data leakage

G Shrivastava, P Kumar - Expert Systems, 2021 - Wiley Online Library
An android application requires specific permissions from the user to access the system
resources and perform required functionalities. Recently, the android market has …

[PDF][PDF] Permission analysis for android malware detection

NV Duc, PT Giang, PM Vi - The proceedings of the 7th vast-AIST …, 2015 - researchgate.net
Nowadays, the popularity of the mobile platform grows, so will the pool of potential victims in
the eyes of malware authors, especially in Android platform. Even, Google has taken steps …

[PDF][PDF] Malicious behavior analysis for android applications

Q Qian, J Cai, M Xie, R Zhang - International Journal of Network …, 2016 - ijns.jalaxy.com.tw
Android, as a modern popular open source mobile platform, makes its security issues more
prominent, especially in user privacy leakage. In this paper, we proposed a twostep model …

[PDF][PDF] Permission extraction framework for android malware detection

A Ghasempour, NFM Sani, JA Ovye - International Journal of …, 2020 - researchgate.net
Nowadays, Android-based devices are more utilized than other Operating Systems based
devices. Statistics show that the market share for android on mobile devices in March 2018 …

APK Auditor: Permission-based Android malware detection system

KA Talha, DI Alper, C Aydin - Digital Investigation, 2015 - Elsevier
Android operating system has the highest market share in 2014; making it the most widely
used mobile operating system in the world. This fact makes Android users the biggest target …

Effective detection of android malware based on the usage of data flow APIs and machine learning

S Wu, P Wang, X Li, Y Zhang - Information and software technology, 2016 - Elsevier
Context. Android has been ranked as the top smartphone platform nowadays. Studies show
that Android malware have increased dramatically and that personal privacy theft has …

PermPair: Android Malware Detection Using Permission Pairs

A Arora, SK Peddoju, M Conti - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android smartphones are highly prone to spreading the malware due to intrinsic
feebleness that permits an application to access the internal resources when the user grants …

Research on android malware permission pattern using permission monitoring system

S Ju, H Seo, J Kwak - Multimedia Tools and Applications, 2016 - Springer
Mobile anti-viruses used mainly are the reverse engineering-based analysis and the
sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time …

A novel permission ranking system for android malware detection—the permission grader

VP Dharmalingam, V Palanisamy - Journal of Ambient Intelligence and …, 2021 - Springer
Android is a profound, vanguard mobile operating system of the contemporary era. The
quantity of mobile phone emptor dependent on Android platform is rising expeditiously …

Performance evaluation on permission-based detection for android malware

CY Huang, YT Tsai, CH Hsu - … and Applications-Volume 2: Proceedings of …, 2013 - Springer
It is a straightforward idea to detect a harmful mobile application based on the permissions it
requests. This study attempts to explore the possibility of detecting malicious applications in …