Collaborative Computing: Networking, Applications and Worksharing. 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Research Article

Android App Classification and Permission Usage Risk Assessment

Download
135 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-00916-8_52,
        author={Yidong Shen and Ming Xu and Ning Zheng and Jian Xu and Wenjing Xia and Yiming Wu and Tong Qiao and Tao Yang},
        title={Android App Classification and Permission Usage Risk Assessment},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11--13, 2017, Proceedings},
        proceedings_a={COLLABORATECOM},
        year={2018},
        month={10},
        keywords={Android Runtime permission Risk score Category},
        doi={10.1007/978-3-030-00916-8_52}
    }
    
  • Yidong Shen
    Ming Xu
    Ning Zheng
    Jian Xu
    Wenjing Xia
    Yiming Wu
    Tong Qiao
    Tao Yang
    Year: 2018
    Android App Classification and Permission Usage Risk Assessment
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-030-00916-8_52
Yidong Shen1,*, Ming Xu1,*, Ning Zheng1,*, Jian Xu1,*, Wenjing Xia1,*, Yiming Wu2,*, Tong Qiao2,*, Tao Yang3,*
  • 1: Internet and Network Security Laboratory of Hangzhou Dianzi University
  • 2: Hangzhou Dianzi University
  • 3: Key Lab of the Third Research Institute of the Ministry of Public Security
*Contact email: 151050043@hdu.edu.cn, mxu@hdu.edu.cn, nzheng@hdu.edu.cn, jian.xu@hdu.edu.cn, 161050051@hdu.edu.cn, ymwu@hdu.edu.cn, tong.qiao@hdu.edu.cn, yangtao@stars.org.cn

Abstract

With Android6.0, users can decide whether to grant an app runtime permission. However, users may not understand the potential negative consequences of granting app permissions. In this paper, we investigate the feasibility of using an app’s requested permissions and the intent-filters, app’s category and permissions requested by other apps in the same category to better inform users about whether to install a given app and the risk scores associated with granting each of the app’s required permissions. In an evaluation with 10,979 benign and 3,205 malicious apps, we demonstrate the effectiveness of the proposal approach.