Mining permission patterns for contrasting clean and malicious android applications


Android application uses permission system to regulate the access to system resources and users’ privacy-relevant information. Existing work have demonstrated several techniques to study the required permissions declared by the developers, but few attention has been paid for used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. In addition, we used a benchmark malware dataset and collected a set of 1227 clean applications to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns.

DOI: 10.1016/j.future.2013.09.014

16 Figures and Tables

Citations per Year

Citation Velocity: 10

Averaging 10 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Cite this paper

@article{Moonsamy2014MiningPP, title={Mining permission patterns for contrasting clean and malicious android applications}, author={Veelasha Moonsamy and Jia Rong and Shaowu Liu}, journal={Future Generation Comp. Syst.}, year={2014}, volume={36}, pages={122-132} }