Assessment of malicious applications using permissions and enhanced user interfaces on Android

Sangho Lee, Da Young Ju

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.

Original languageEnglish
Title of host publicationIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationBig Data, Emergent Threats, and Decision-Making in Security Informatics
Pages270
Number of pages1
DOIs
Publication statusPublished - 2013
Event11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 - Seattle, WA, United States
Duration: 2013 Jun 42013 Jun 7

Publication series

NameIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics

Other

Other11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013
Country/TerritoryUnited States
CitySeattle, WA
Period13/6/413/6/7

Bibliographical note

Funding Information:
This study was supported by grant no. 6818-3 from the Grant Agency of the Ministry of Health of the Czech Republic.

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems

Fingerprint

Dive into the research topics of 'Assessment of malicious applications using permissions and enhanced user interfaces on Android'. Together they form a unique fingerprint.

Cite this