Research on android malware permission pattern using permission monitoring system
Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibi...
Ausführliche Beschreibung
Autor*in: |
Ju, Seung-hwan [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2016 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 75(2016), 22 vom: 28. Jan., Seite 14807-14817 |
---|---|
Übergeordnetes Werk: |
volume:75 ; year:2016 ; number:22 ; day:28 ; month:01 ; pages:14807-14817 |
Links: |
---|
DOI / URN: |
10.1007/s11042-016-3273-x |
---|
Katalog-ID: |
OLC2035027101 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035027101 | ||
003 | DE-627 | ||
005 | 20230503192921.0 | ||
007 | tu | ||
008 | 200819s2016 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-016-3273-x |2 doi | |
035 | |a (DE-627)OLC2035027101 | ||
035 | |a (DE-He213)s11042-016-3273-x-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Ju, Seung-hwan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Research on android malware permission pattern using permission monitoring system |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2016 | ||
520 | |a Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. | ||
650 | 4 | |a Mobile security | |
650 | 4 | |a Application permission | |
650 | 4 | |a Application analysis | |
700 | 1 | |a Seo, Hee-suk |4 aut | |
700 | 1 | |a Kwak, Jin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 75(2016), 22 vom: 28. Jan., Seite 14807-14817 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:75 |g year:2016 |g number:22 |g day:28 |g month:01 |g pages:14807-14817 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-016-3273-x |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 75 |j 2016 |e 22 |b 28 |c 01 |h 14807-14817 |
author_variant |
s h j shj h s s hss j k jk |
---|---|
matchkey_str |
article:13807501:2016----::eerhnnrimlaeemsinatruigemsi |
hierarchy_sort_str |
2016 |
publishDate |
2016 |
allfields |
10.1007/s11042-016-3273-x doi (DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p DE-627 ger DE-627 rakwb eng 070 004 VZ Ju, Seung-hwan verfasserin aut Research on android malware permission pattern using permission monitoring system 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. Mobile security Application permission Application analysis Seo, Hee-suk aut Kwak, Jin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2016), 22 vom: 28. Jan., Seite 14807-14817 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 https://doi.org/10.1007/s11042-016-3273-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2016 22 28 01 14807-14817 |
spelling |
10.1007/s11042-016-3273-x doi (DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p DE-627 ger DE-627 rakwb eng 070 004 VZ Ju, Seung-hwan verfasserin aut Research on android malware permission pattern using permission monitoring system 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. Mobile security Application permission Application analysis Seo, Hee-suk aut Kwak, Jin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2016), 22 vom: 28. Jan., Seite 14807-14817 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 https://doi.org/10.1007/s11042-016-3273-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2016 22 28 01 14807-14817 |
allfields_unstemmed |
10.1007/s11042-016-3273-x doi (DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p DE-627 ger DE-627 rakwb eng 070 004 VZ Ju, Seung-hwan verfasserin aut Research on android malware permission pattern using permission monitoring system 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. Mobile security Application permission Application analysis Seo, Hee-suk aut Kwak, Jin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2016), 22 vom: 28. Jan., Seite 14807-14817 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 https://doi.org/10.1007/s11042-016-3273-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2016 22 28 01 14807-14817 |
allfieldsGer |
10.1007/s11042-016-3273-x doi (DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p DE-627 ger DE-627 rakwb eng 070 004 VZ Ju, Seung-hwan verfasserin aut Research on android malware permission pattern using permission monitoring system 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. Mobile security Application permission Application analysis Seo, Hee-suk aut Kwak, Jin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2016), 22 vom: 28. Jan., Seite 14807-14817 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 https://doi.org/10.1007/s11042-016-3273-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2016 22 28 01 14807-14817 |
allfieldsSound |
10.1007/s11042-016-3273-x doi (DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p DE-627 ger DE-627 rakwb eng 070 004 VZ Ju, Seung-hwan verfasserin aut Research on android malware permission pattern using permission monitoring system 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. Mobile security Application permission Application analysis Seo, Hee-suk aut Kwak, Jin aut Enthalten in Multimedia tools and applications Springer US, 1995 75(2016), 22 vom: 28. Jan., Seite 14807-14817 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 https://doi.org/10.1007/s11042-016-3273-x lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 75 2016 22 28 01 14807-14817 |
language |
English |
source |
Enthalten in Multimedia tools and applications 75(2016), 22 vom: 28. Jan., Seite 14807-14817 volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 |
sourceStr |
Enthalten in Multimedia tools and applications 75(2016), 22 vom: 28. Jan., Seite 14807-14817 volume:75 year:2016 number:22 day:28 month:01 pages:14807-14817 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Mobile security Application permission Application analysis |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Ju, Seung-hwan @@aut@@ Seo, Hee-suk @@aut@@ Kwak, Jin @@aut@@ |
publishDateDaySort_date |
2016-01-28T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035027101 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035027101</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192921.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-016-3273-x</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035027101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-016-3273-x-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ju, Seung-hwan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research on android malware permission pattern using permission monitoring system</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application permission</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application analysis</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seo, Hee-suk</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kwak, Jin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2016), 22 vom: 28. Jan., Seite 14807-14817</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:22</subfield><subfield code="g">day:28</subfield><subfield code="g">month:01</subfield><subfield code="g">pages:14807-14817</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-016-3273-x</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2016</subfield><subfield code="e">22</subfield><subfield code="b">28</subfield><subfield code="c">01</subfield><subfield code="h">14807-14817</subfield></datafield></record></collection>
|
author |
Ju, Seung-hwan |
spellingShingle |
Ju, Seung-hwan ddc 070 misc Mobile security misc Application permission misc Application analysis Research on android malware permission pattern using permission monitoring system |
authorStr |
Ju, Seung-hwan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Research on android malware permission pattern using permission monitoring system Mobile security Application permission Application analysis |
topic |
ddc 070 misc Mobile security misc Application permission misc Application analysis |
topic_unstemmed |
ddc 070 misc Mobile security misc Application permission misc Application analysis |
topic_browse |
ddc 070 misc Mobile security misc Application permission misc Application analysis |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Research on android malware permission pattern using permission monitoring system |
ctrlnum |
(DE-627)OLC2035027101 (DE-He213)s11042-016-3273-x-p |
title_full |
Research on android malware permission pattern using permission monitoring system |
author_sort |
Ju, Seung-hwan |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
txt |
container_start_page |
14807 |
author_browse |
Ju, Seung-hwan Seo, Hee-suk Kwak, Jin |
container_volume |
75 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Ju, Seung-hwan |
doi_str_mv |
10.1007/s11042-016-3273-x |
dewey-full |
070 004 |
title_sort |
research on android malware permission pattern using permission monitoring system |
title_auth |
Research on android malware permission pattern using permission monitoring system |
abstract |
Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. © Springer Science+Business Media New York 2016 |
abstractGer |
Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. © Springer Science+Business Media New York 2016 |
abstract_unstemmed |
Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study. © Springer Science+Business Media New York 2016 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
22 |
title_short |
Research on android malware permission pattern using permission monitoring system |
url |
https://doi.org/10.1007/s11042-016-3273-x |
remote_bool |
false |
author2 |
Seo, Hee-suk Kwak, Jin |
author2Str |
Seo, Hee-suk Kwak, Jin |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-016-3273-x |
up_date |
2024-07-03T23:29:51.419Z |
_version_ |
1803602510657617920 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035027101</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503192921.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-016-3273-x</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035027101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-016-3273-x-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ju, Seung-hwan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research on android malware permission pattern using permission monitoring system</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application permission</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application analysis</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seo, Hee-suk</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kwak, Jin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">75(2016), 22 vom: 28. Jan., Seite 14807-14817</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:75</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:22</subfield><subfield code="g">day:28</subfield><subfield code="g">month:01</subfield><subfield code="g">pages:14807-14817</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-016-3273-x</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">75</subfield><subfield code="j">2016</subfield><subfield code="e">22</subfield><subfield code="b">28</subfield><subfield code="c">01</subfield><subfield code="h">14807-14817</subfield></datafield></record></collection>
|
score |
7.397828 |