TY - GEN
T1 - Permlyzer
T2 - 2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013
AU - Xu, Wei
AU - Zhang, Fangfang
AU - Zhu, Sencun
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - As one of the most popular mobile platforms, the Android system implements an install-time permission mechanism to provide users with an opportunity to deny potential risky permissions requested by an application. In order for both users and application vendors to make informed decisions, we designed and built Permlyzer, a general-purpose framework to automatically analyze the uses of requested permissions in Android applications. Permlyzer leverages the combination of runtime analysis and static examination to perform an accurate and in-depth analysis. The call stack-based analysis in Permlyzer can provide fine-grained information of the permission uses from various aspects include location, cause and purpose. More importantly, Permlyzer can automatically explore the functionality of an application and analyze the permission uses. Our evaluation using 51 malware/spyware families and over 110,000 Android applications demonstrates that Permlyzer can provide detailed permission use analysis and discover the characteristics of the permission uses in both benign and malicious applications.
AB - As one of the most popular mobile platforms, the Android system implements an install-time permission mechanism to provide users with an opportunity to deny potential risky permissions requested by an application. In order for both users and application vendors to make informed decisions, we designed and built Permlyzer, a general-purpose framework to automatically analyze the uses of requested permissions in Android applications. Permlyzer leverages the combination of runtime analysis and static examination to perform an accurate and in-depth analysis. The call stack-based analysis in Permlyzer can provide fine-grained information of the permission uses from various aspects include location, cause and purpose. More importantly, Permlyzer can automatically explore the functionality of an application and analyze the permission uses. Our evaluation using 51 malware/spyware families and over 110,000 Android applications demonstrates that Permlyzer can provide detailed permission use analysis and discover the characteristics of the permission uses in both benign and malicious applications.
UR - http://www.scopus.com/inward/record.url?scp=84893330207&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893330207&partnerID=8YFLogxK
U2 - 10.1109/ISSRE.2013.6698893
DO - 10.1109/ISSRE.2013.6698893
M3 - Conference contribution
AN - SCOPUS:84893330207
SN - 9781479923663
T3 - 2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013
SP - 400
EP - 410
BT - 2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013
Y2 - 4 November 2013 through 7 November 2013
ER -