Pranav Kotak, S. Bhandari, A. Zemmari, Jaykrishna Joshi
{"title":"通过隐藏权限隐藏的Android应用揭秘隐私泄露","authors":"Pranav Kotak, S. Bhandari, A. Zemmari, Jaykrishna Joshi","doi":"10.1109/PST52912.2021.9647851","DOIUrl":null,"url":null,"abstract":"Data theft is a significant security threat for mobile app users. The growing importance of digitization motivates the diversity of available applications. In this paper, we propose a novel and lightweight method for classifying Android apps into low, medium, and high-risk categories. Our approach relies largely on the other permissions (also termed as hidden permissions) of the Android applications. We have proposed a linear regression-based technique to classify the apps into different risk categories. We will show how other permissions can be used as a strong indicator for defining risk categories. We have used K-means clustering to validate and explain the decision of our method. In an evaluation with 500 applications and 101 other permissions, our proposed approach decides the risk factor of an app, and the explanation is provided for each detection reveal relevant properties of the detected risk.","PeriodicalId":144610,"journal":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions\",\"authors\":\"Pranav Kotak, S. Bhandari, A. Zemmari, Jaykrishna Joshi\",\"doi\":\"10.1109/PST52912.2021.9647851\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data theft is a significant security threat for mobile app users. The growing importance of digitization motivates the diversity of available applications. In this paper, we propose a novel and lightweight method for classifying Android apps into low, medium, and high-risk categories. Our approach relies largely on the other permissions (also termed as hidden permissions) of the Android applications. We have proposed a linear regression-based technique to classify the apps into different risk categories. We will show how other permissions can be used as a strong indicator for defining risk categories. We have used K-means clustering to validate and explain the decision of our method. In an evaluation with 500 applications and 101 other permissions, our proposed approach decides the risk factor of an app, and the explanation is provided for each detection reveal relevant properties of the detected risk.\",\"PeriodicalId\":144610,\"journal\":{\"name\":\"2021 18th International Conference on Privacy, Security and Trust (PST)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 18th International Conference on Privacy, Security and Trust (PST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PST52912.2021.9647851\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 18th International Conference on Privacy, Security and Trust (PST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PST52912.2021.9647851","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions
Data theft is a significant security threat for mobile app users. The growing importance of digitization motivates the diversity of available applications. In this paper, we propose a novel and lightweight method for classifying Android apps into low, medium, and high-risk categories. Our approach relies largely on the other permissions (also termed as hidden permissions) of the Android applications. We have proposed a linear regression-based technique to classify the apps into different risk categories. We will show how other permissions can be used as a strong indicator for defining risk categories. We have used K-means clustering to validate and explain the decision of our method. In an evaluation with 500 applications and 101 other permissions, our proposed approach decides the risk factor of an app, and the explanation is provided for each detection reveal relevant properties of the detected risk.