2019
DOI: 10.3390/su11236637
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Evaluation Method through Correlation Analysis of Android Applications

Abstract: Due to people in companies use mobile devices to access corporate data, attackers targeting corporate data use vulnerabilities in mobile devices. Most vulnerabilities in applications are caused by the carelessness of developers, and confused deputy attacks and data leak attacks using inter-application vulnerabilities are possible. These vulnerabilities are difficult to find through the single-application diagnostic tool that is currently being studied. This paper proposes a process to automate the decompilatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Most of these features are of (i) numeric (i.e., Description Length, Photos, APK Size, Average Rating, Number of Raters and Number of Permissions), (ii) nominal (i.e., Play Store Category and Number of Installs), or (iii) boolean (i.e., Contains Ads, In App Purchase, and each specific Permission in the list) types. Note that, while the relationships between the individual features in Table 2 and security risks have been extensively studied in prior research [29,51,92,95,97], we leverage findings from these previous studies for selecting significant features to train machine learning algorithms.…”
Section: Photosmentioning
confidence: 99%
“…Most of these features are of (i) numeric (i.e., Description Length, Photos, APK Size, Average Rating, Number of Raters and Number of Permissions), (ii) nominal (i.e., Play Store Category and Number of Installs), or (iii) boolean (i.e., Contains Ads, In App Purchase, and each specific Permission in the list) types. Note that, while the relationships between the individual features in Table 2 and security risks have been extensively studied in prior research [29,51,92,95,97], we leverage findings from these previous studies for selecting significant features to train machine learning algorithms.…”
Section: Photosmentioning
confidence: 99%