A neural network approach to category validation of Android applications

Permission structure of Android applications introduces security vulnerabilities which can be readily exploited by third-party applications. We address certain exploitability aspects by means of neural networks, effective classification techniques capable of verifying the application categories. We devise a novel methodology to verify an application category by machine-learning the application permissions and estimating likelihoods of the extant categories. The performance of our classifier is optimized through the joint minimization of false positive and negative rates. Applying our modus operandi to 1,700 popular third-party Android applications and malwares, a major portion of the category declarations were judged truthfully. This manifests effectiveness of neural network decision engines in validating Android application categories.

[1]  Mauro Conti,et al.  CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.

[2]  Paul C. van Oorschot,et al.  A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.

[3]  Marko Helenius,et al.  About malicious software in smartphones , 2006, Journal in Computer Virology.

[4]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[5]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[6]  Martin T. Hagan,et al.  Gauss-Newton approximation to Bayesian learning , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[7]  Elie Bienenstock,et al.  Neural Networks and the Bias/Variance Dilemma , 1992, Neural Computation.

[8]  S. Grossberg Neural Networks and Natural Intelligence , 1988 .

[9]  David J. C. MacKay,et al.  Bayesian Interpolation , 1992, Neural Computation.

[10]  Teuvo Kohonen,et al.  The self-organizing map , 1990 .

[11]  Matthias Lange,et al.  L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.

[12]  Xinwen Zhang,et al.  Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.

[13]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[14]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[15]  F.C. Freiling,et al.  On the Effort to Create Smartphone Worms in Windows Mobile , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[16]  Yuriy Bulygin,et al.  Epidemics of Mobile Worms , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[17]  Hao Chen,et al.  Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.

[18]  David A. Wagner,et al.  Analyzing inter-application communication in Android , 2011, MobiSys '11.

[19]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.

[20]  Nachum Shacham,et al.  Self-organizing networks , 1988, Future Gener. Comput. Syst..

[21]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[22]  J. Foster,et al.  SCanDroid: Automated Security Certification of Android , 2009 .