Assessment of malicious applications using permissions and enhanced user interfaces on Android

Sangho Lee, Da Young Ju

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.

Original languageEnglish
Title of host publicationIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationBig Data, Emergent Threats, and Decision-Making in Security Informatics
Number of pages1
DOIs
Publication statusPublished - 2013 Sep 9
Event11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 - Seattle, WA, United States
Duration: 2013 Jun 42013 Jun 7

Publication series

NameIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics

Other

Other11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013
CountryUnited States
CitySeattle, WA
Period13/6/413/6/7

Fingerprint

User interfaces
Smartphones
Android (operating system)

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems

Cite this

Lee, S., & Ju, D. Y. (2013). Assessment of malicious applications using permissions and enhanced user interfaces on Android. In IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics [6578838] (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics). https://doi.org/10.1109/ISI.2013.6578838
Lee, Sangho ; Ju, Da Young. / Assessment of malicious applications using permissions and enhanced user interfaces on Android. IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. 2013. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).
@inproceedings{59362e9c93a042a596ae918fe2b5c777,
title = "Assessment of malicious applications using permissions and enhanced user interfaces on Android",
abstract = "Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.",
author = "Sangho Lee and Ju, {Da Young}",
year = "2013",
month = "9",
day = "9",
doi = "10.1109/ISI.2013.6578838",
language = "English",
isbn = "9781467362115",
series = "IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics",
booktitle = "IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics",

}

Lee, S & Ju, DY 2013, Assessment of malicious applications using permissions and enhanced user interfaces on Android. in IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics., 6578838, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics, 11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013, Seattle, WA, United States, 13/6/4. https://doi.org/10.1109/ISI.2013.6578838

Assessment of malicious applications using permissions and enhanced user interfaces on Android. / Lee, Sangho; Ju, Da Young.

IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. 2013. 6578838 (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Assessment of malicious applications using permissions and enhanced user interfaces on Android

AU - Lee, Sangho

AU - Ju, Da Young

PY - 2013/9/9

Y1 - 2013/9/9

N2 - Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.

AB - Smartphone OS, such as Android, enables us to install third party applications. However, security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign required permissions. For this reason, attackers can inject exploits into a normal application with inappropriately acquired permissions. In this paper, we propose a method to distinguish an application by analyzing permissions set and enhanced user interfaces to improve the chance of making right decisions. The proposed methods are intended for users to make better decisions with more information provided by the system.

UR - http://www.scopus.com/inward/record.url?scp=84883430997&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883430997&partnerID=8YFLogxK

U2 - 10.1109/ISI.2013.6578838

DO - 10.1109/ISI.2013.6578838

M3 - Conference contribution

AN - SCOPUS:84883430997

SN - 9781467362115

T3 - IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics

BT - IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics

ER -

Lee S, Ju DY. Assessment of malicious applications using permissions and enhanced user interfaces on Android. In IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. 2013. 6578838. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics). https://doi.org/10.1109/ISI.2013.6578838