Abstract
Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.
Original language | English |
---|---|
Title of host publication | IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics |
Subtitle of host publication | Big Data, Emergent Threats, and Decision-Making in Security Informatics |
Pages | 270 |
Number of pages | 1 |
DOIs | |
Publication status | Published - 2013 |
Event | 11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 - Seattle, WA, United States Duration: 2013 Jun 4 → 2013 Jun 7 |
Publication series
Name | IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics |
---|
Other
Other | 11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 |
---|---|
Country/Territory | United States |
City | Seattle, WA |
Period | 13/6/4 → 13/6/7 |
Bibliographical note
Funding Information:This study was supported by grant no. 6818-3 from the Grant Agency of the Ministry of Health of the Czech Republic.
All Science Journal Classification (ASJC) codes
- Artificial Intelligence
- Information Systems