CFP last date
20 May 2024
Reseach Article

Effective Risk Analysis and Risk Detection for Android Apps

by Deshmukh Sharad R., Patil B. M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 6
Year of Publication: 2016
Authors: Deshmukh Sharad R., Patil B. M.
10.5120/ijca2016911130

Deshmukh Sharad R., Patil B. M. . Effective Risk Analysis and Risk Detection for Android Apps. International Journal of Computer Applications. 147, 6 ( Aug 2016), 29-32. DOI=10.5120/ijca2016911130

@article{ 10.5120/ijca2016911130,
author = { Deshmukh Sharad R., Patil B. M. },
title = { Effective Risk Analysis and Risk Detection for Android Apps },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 6 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number6/25659-2016911130/ },
doi = { 10.5120/ijca2016911130 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:12.107552+05:30
%A Deshmukh Sharad R.
%A Patil B. M.
%T Effective Risk Analysis and Risk Detection for Android Apps
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 6
%P 29-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The features and functionality of the different mobile devices has made them attractive targets for malicious applications. There are different types of risks are present in recent apps. Android’s permission system is intended to inform users about the risks in installing apps. Whenever a user installs an application, he or she has the chance to review the application’s permission requests and cancel the installation if the permissions are imprudent or unacceptable. Basically previous research focus on reliance on users is not so effective, as most of the users don’t understand the permission information. Actually in this work focused on the permission of the particular application. In this work here proposed a system to provide summary risk communication to user in friendly manner which is easy to understand. Finally in this work introduced how to relate risk permissions and risk rating with the risk analysis by using risk score and risk value.

References
  1. Christopher S. Gates, Jing Chen, Ninghui Li, Senior Member, IEEE, and Robert W. Proctor, “Effective Risk Communication for Android Apps” IEEE Transaction on Dependable and secure computing, vol.11, no. 3, May- June 2014
  2. A.P. Felt, K. Greenwood, and D. Wagner, “The Effectiveness of Application permissions”,proc. Second USENIX Conf. Web Application Development (WebApps ’11), 2011.
  3. XF. Xie, M. Wang, R. Zhang, J. Li, and QY. Yu, “The Role of Emotions in Risk communication,” Risk Analysis, vol. 31, no. 3, pp. 450-465, 2011.
  4. I. Rassameeroj and Y. Tanahashi,Various approaches in analyzing android applications with its permission-based security models," in Electro/Information Technology (EIT), 2011 IEEE International Conference on, pp. 1-6, 2011.
  5. E. Chin, A.P. Felt, V.Sekar, and D. Wagner, “Measuring User Confidence in Smartphone Security and Privacy,” Proc. Eighth Symp. Usable Privacy and Security (SOUPS ’12), pp. 1-16, 2012.
  6. A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android Permissions: User Attention, Compréhensions, and Behavior,” Proc. Eighth Symp. Usable Privacy and Security, 2012
  7. K.A. Juang, S. Ranganayakulu, and J.S. Greenstein, “Using System-Generated Mnemonics to Improve the Usability and Security of Password Authentication,” Proc. Human Factor and Ergonomics Soc. Ann. Meeting, vol. 56, no. 1, pp. 506-510, 2012.
  8. P.G. Kelley, S. Consolvo, L.F. Cranor, J. Jung, N. Sadeh, and D.Wetherall, “A Conundrum of Permissions: Installing Applications on an Android Smartphone,” Proc. Workshop Usable Security (USEC ’12), Feb. 2012.
  9. H. Peng,C.S. Gates, B.P. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy,“Using Probabilistic Generative Models for Ranking Risks of Android Apps,” Proc. ACM Conf. Computer and Comm. Security, pp.241-252, 2012.
  10. J. Staddon, D. Huffaker, L. Brown, and A. Sedley, “Are Privacy Concerns a Turn-Off? Engagement and Privacy in Social Networks,” Proc. Eighth Symp. Usable Privacy and Security (SOUPS ’12), pp. 1-13, 2012.
  11. P.G. Kelley, L.F.Cranor, and N. Sadeh,“Privacy as Part of the App Decision-Making process,”Proc. Conf. Human Factors in Computing Systems (CHI ’13), pp. 3393-3402, 2013.
  12. Kevin Benton, L Jean Camp, and Vaibhav Garg. Studying the Effectiveness of Android Application Permissions Requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291-296. IEEE, 2013.
  13. Alexios Mylonas, Anastasia Kastania, and Dimitris Gritzalis. Delegate the Smartphone User? Security Awareness in Smartphone Platforms. Computers & Security, 34:47-66, 2013.
  14. Veelasha Moonsamy, Jia Rong, and Shaowu Liu. Mining Permission Patterns for Contrasting Clean and Malicious Android Applications. Future Generation Computer Systems, 36:122-132, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Apps permissions Risk value and Risk Analysis