2015
DOI: 10.1016/j.procs.2015.02.148
|View full text |Cite
|
Sign up to set email alerts
|

Spyware Detection in Android Using Hybridization of Description Analysis, Permission Mapping and Interface Analysis

Abstract: Among all available Mobile OS, Android is an ideal target for attackers due to its huge popularity. Android provides open-source OS and also provides ability to install third party applications that poses threat of user's privacy breach. In this paper, we have a close look at permissions that are granted during installation period. We have proposed a hybrid approach for detection of malicious applications by scanning with different antivirus softwares and comparing all. This hybrid approach depends upon three … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
“…The authors in [127] studied industrial mobile-IoT malware detection techniques and analyzed them in terms of static, dynamic, and hybrid approaches. A hybrid approach is proposed in [129] for detecting Spyware using and comparing various antivirus software. This technique is based on three parameters: description mapping, interface analysis and source code analysis.…”
Section: B Autonomic Approachesmentioning
confidence: 99%
“…Kaur et al [ 24 ] proposed a detection framework based on description analysis, permission mapping, and interface analysis. The researchers proposed gathering data from three primary sources, description mapping, interface layout, and source code analysis, along with all permissions gleaned from the XML file; thus, these data are used to create pre-digital signatures for applications that may engage in espionage activities.…”
Section: Background and Related Workmentioning
confidence: 99%