Guang Shi , Tao Li , Qinghe Zhou , Menglin Liu , Yuan Feng
{"title":"基于用户评价的Android应用安全多维度评估","authors":"Guang Shi , Tao Li , Qinghe Zhou , Menglin Liu , Yuan Feng","doi":"10.1016/j.cose.2025.104499","DOIUrl":null,"url":null,"abstract":"<div><div>With the increasing Android applications, the problem of malicious behavior in Android applications is growing. Some applications are hostile in their design, and some collect excessive information in use and behave in a user-unexpected way. Existing application’s security detection methods include static and dynamic analysis, with limitations such as single detection methods, poorly integrated detection, and failure to consider user expectations. Therefore, based on the behavior of the Android application, this paper proposes a comprehensive mobile applications detection mechanism combining static analysis, dynamic analysis, and users’ subjective expectations. This paper introduces permission relevancy in static detection to enhance the fine grain of permission-based static detection. Moreover, the historical confidence in dynamic analysis quantitates the applications’ behavior characteristics, and the low efficiency is compensated. Static analysis can guide the dynamic analysis and improve the accuracy and coverage rate. We introduce subjective expectations to private objects and a comprehensive monitoring mechanism during the assessment process. An experiment based on real-world Android applications is carried out to validate the scheme in this paper. According to the Android application test analysis, the proposed mechanism can quantitate and assess the software security based on different users’ degrees of privacy concerns. The experiments demonstrate that our proposed system achieves a recognition rate of 97.27% for identifying malicious behaviors in test application. The proposed mechanism is more accurate than only static analysis, more efficient than only dynamic analysis, and the degree of danger can be adjusted according to the user’s subjective expectations.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104499"},"PeriodicalIF":4.8000,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multi-dimensional assessment for Android application security based on users’ evaluation\",\"authors\":\"Guang Shi , Tao Li , Qinghe Zhou , Menglin Liu , Yuan Feng\",\"doi\":\"10.1016/j.cose.2025.104499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the increasing Android applications, the problem of malicious behavior in Android applications is growing. Some applications are hostile in their design, and some collect excessive information in use and behave in a user-unexpected way. Existing application’s security detection methods include static and dynamic analysis, with limitations such as single detection methods, poorly integrated detection, and failure to consider user expectations. Therefore, based on the behavior of the Android application, this paper proposes a comprehensive mobile applications detection mechanism combining static analysis, dynamic analysis, and users’ subjective expectations. This paper introduces permission relevancy in static detection to enhance the fine grain of permission-based static detection. Moreover, the historical confidence in dynamic analysis quantitates the applications’ behavior characteristics, and the low efficiency is compensated. Static analysis can guide the dynamic analysis and improve the accuracy and coverage rate. We introduce subjective expectations to private objects and a comprehensive monitoring mechanism during the assessment process. An experiment based on real-world Android applications is carried out to validate the scheme in this paper. According to the Android application test analysis, the proposed mechanism can quantitate and assess the software security based on different users’ degrees of privacy concerns. The experiments demonstrate that our proposed system achieves a recognition rate of 97.27% for identifying malicious behaviors in test application. The proposed mechanism is more accurate than only static analysis, more efficient than only dynamic analysis, and the degree of danger can be adjusted according to the user’s subjective expectations.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"156 \",\"pages\":\"Article 104499\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-04-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825001877\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825001877","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Multi-dimensional assessment for Android application security based on users’ evaluation
With the increasing Android applications, the problem of malicious behavior in Android applications is growing. Some applications are hostile in their design, and some collect excessive information in use and behave in a user-unexpected way. Existing application’s security detection methods include static and dynamic analysis, with limitations such as single detection methods, poorly integrated detection, and failure to consider user expectations. Therefore, based on the behavior of the Android application, this paper proposes a comprehensive mobile applications detection mechanism combining static analysis, dynamic analysis, and users’ subjective expectations. This paper introduces permission relevancy in static detection to enhance the fine grain of permission-based static detection. Moreover, the historical confidence in dynamic analysis quantitates the applications’ behavior characteristics, and the low efficiency is compensated. Static analysis can guide the dynamic analysis and improve the accuracy and coverage rate. We introduce subjective expectations to private objects and a comprehensive monitoring mechanism during the assessment process. An experiment based on real-world Android applications is carried out to validate the scheme in this paper. According to the Android application test analysis, the proposed mechanism can quantitate and assess the software security based on different users’ degrees of privacy concerns. The experiments demonstrate that our proposed system achieves a recognition rate of 97.27% for identifying malicious behaviors in test application. The proposed mechanism is more accurate than only static analysis, more efficient than only dynamic analysis, and the degree of danger can be adjusted according to the user’s subjective expectations.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.