Skip to main content

Android Apps Security Evaluation System in the Cloud

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom 2015)

Abstract

It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Apps. For the Apps security evaluation, the paper proceed from the Android permission mechanism, proposes a classified dynamic security evaluation method. Apps security evaluation system include the large-scale permissions capturing and classification risk evaluation algorithm. The system could find the minimum permissions which are the common features of Apps. The minimum permissions can be dynamically changed according to different classified Apps. We adopt Euclidean distance-based similarity calculation algorithm to evaluate risk. The difference value determines the APP’s malicious risk. Experiments prove that the system has reference value to the APP security assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Internet environmental remediation report at 2014 first half[R/OL] 10 September 2014

    Google Scholar 

  2. Burguera, I., Zurutuza, U., Nadjm–Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Sercurity and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM, New York (2011)

    Google Scholar 

  3. Schmidt, A.D., Bye, R., Schmidt, H.G., et al.: Static analysis of executable for collaborative malware detection on Android. In: Proceedings of the 2009 IEEE International Conference on Communications, pp. 631–635. IEEE Press, Piscataway (2009)

    Google Scholar 

  4. Zhang, Y., Yang, J.: Android malware detection based on permissions. Comput. Appl. 34(5), 1322–1325 (2014)

    Google Scholar 

  5. Google.Mainfest.permission[EB/OL], 01 November 2013. http://developer.android.com/reference/android/Manifest.permission.html

  6. Song, Y., Zhang, Y.,, Meng, H.: Research Euclidean distance clustering method based on weighted. Computer Engineering and Applications (2007)

    Google Scholar 

  7. Liu, R.: Weighted Euclidean distance and its application. Mathematical Statistics and Management (2002)

    Google Scholar 

Download references

Acknowledgement

Authors are partially supported by Colleges and Universities in Hubei Provincial College Students’ Innovative Entrepreneurial Training Program (No.201510488006), National Natural Science Foundation of China (No.61273225), Humanities and Social Sciences Foundation of Education Ministry of Hubei Province (No.2012D111).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Wang, H., Li, T., Zhang, T., Wang, J. (2016). Android Apps Security Evaluation System in the Cloud. In: Guo, S., Liao, X., Liu, F., Zhu, Y. (eds) Collaborative Computing: Networking, Applications, and Worksharing. CollaborateCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-28910-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28910-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28909-0

  • Online ISBN: 978-3-319-28910-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics