2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.236
|View full text |Cite
|
Sign up to set email alerts
|

Reputation Based Security Model for Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Based on comment analysis, this work derives probabilistic model to assess reputation of any application and therefore estimates whether it is honest or dishonest seen as malicious or benign in terms of security aspects. Tesfay et al [8] put in place a private cloud to control user installations of Android applications and to keep track of feedbacks from users. They evaluate reputation of applications based on feedbacks, vendor's reputation and number of users who run the same application.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on comment analysis, this work derives probabilistic model to assess reputation of any application and therefore estimates whether it is honest or dishonest seen as malicious or benign in terms of security aspects. Tesfay et al [8] put in place a private cloud to control user installations of Android applications and to keep track of feedbacks from users. They evaluate reputation of applications based on feedbacks, vendor's reputation and number of users who run the same application.…”
Section: Related Workmentioning
confidence: 99%
“…As for any social ecosystem, an application (seen as an agent) should be associated with a reputation score to predict bad behaviors [7]. Tesfay et al [8] evaluate security-related reputation based on user feedbacks, number of users who installed the studied application and the reputation of vendors. This proposal is subjective, does not exploit sentiment analysis on feedbacks and is subject to false reputation in case there are few feedbacks.…”
Section: Introductionmentioning
confidence: 99%
“…Within data, there are around 45K different developer names and 40K certificate issuer names. Following [28], we have created two new features called developerRep and issuerRep which account for the percentage of applications that each developer and certificate issuer have tagged as malware. The reader must note that Google Play allows self-signed applications, i.e.…”
Section: Entity-related Features: Developers and Certificate Issuersmentioning
confidence: 99%
“…In [13], we (Tesfay, Andersson and Booth) described a cloud and reputation based security model for Android phones. Comment: Our new solution can implement that cloud and reputation based security model, in our proposed Password Management Service.…”
Section: Related Workmentioning
confidence: 99%