Skip to main content

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS

  • Conference paper
Computational Science and Its Applications – ICCSA 2013 (ICCSA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7971))

Included in the following conference series:

Abstract

Nowadays, the smartphone has become the critical issue of users information security. The smartphone services not only principal functions of a cellular phone but also personalized functions such as mobile banking and GPS location tracking. It means that an attacker will be able to obtain a variety of personal information when an attacker compromises the smartphone. For this reason, malwares target environments have been changed to the smartphone platforms from computers. The android OS has the permission mechanism that was designed to prevent malicious behaviors of installed applications. However most of the users are not concerned about permissions of application to install. Thus, the android OS needs an advanced security mechanism that will be able to warn malicious behaviors of installed applications to the user. In this paper, we proposed permission-based application monitoring model, which is performed at the Android OS-level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Android Developers, http://developer.android.com/sdk/index.html

  2. Android Official Blog. Google Play hits 25 billion downloads, http://officialandroid.blogspot.kr/2012/09/google-play-hits-25-billion-downloads.html

  3. Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. In: The 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14. ACM, New York (2011)

    Chapter  Google Scholar 

  4. Symantec, A-Z listing of threats & risks, http://www.symantec.com/security_respo-nse/landing/azlisting.jsp?inid=us_sr_flyout_reporting_allthreats

  5. Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wanger, D.: Android Permissions: User Attention, Comprehension, and Behavior. In: The Eighth Symposium on Usable Privacy and Security, Article No. 3. ACM, New York (2012)

    Google Scholar 

  6. Android Developers, Permissions, http://developer.android.com/guide/topics/secur-ity/permissions.html

  7. Symantec, AndroidOS.FakePlayer, http://www.symantec.com/security_response/w-riteup.jsp?docid=2010-081100-1646-99

  8. Polla, M.L., Martinelli, F., Sgandurra, D.: A survey on Security for Mobile devices. IEEE Communications Surveys & Tutorials 15(1), 446–471

    Google Scholar 

  9. Symantec, Android.Beaglespy, http://www.symantec.com/security_response/write-up.jsp?docid=2012-091010-0627-99

  10. Symantec, Android.Ecardgrabber, http://www.symantec.com/security_response/-writeup.jsp?docid=2012-062215-0939-99

  11. Bose, A.: Hu. X., Shin, K.G., Park, T.: Behavioral Detection of Malware on Mobile Handsets. In: The 6th International Conference on Mobile Systems, Applications, and Services, pp. 225–238. ACM, New York (2008)

    Google Scholar 

  12. Felt, A.P., Chin, E., Hanna, S., Song, D., Wanger, D.: Android Permissions Demystified. In: The 18th ACM Conference on Computer and Communications Security, pp. 627–638. ACM, New York (2011)

    Google Scholar 

  13. Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security and Privacy 7(1), 50–57 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, MW., Choi, YH., Eom, JH., Chung, TM. (2013). The Permission-Based Malicious Behaviors Monitoring Model for the Android OS. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2013. ICCSA 2013. Lecture Notes in Computer Science, vol 7971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39637-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39637-3_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39636-6

  • Online ISBN: 978-3-642-39637-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics