Skip to main content

Android Market Analysis with Activation Patterns

  • Conference paper

Abstract

The increasing market share of the Android platform is partly caused by a growing number of applications (apps) available on the Android market: by now (January 2011) roughly 200.000. This popularity in combination with the lax market approval process attracts the injection of malicious apps into the market. Android features a fine-grained permission system allowing the user to review the permissions an app requests and grant or deny access to resources prior to installation. In this paper, we extract these security permissions along other metadata of 130.211 apps and apply a new analysis method called Activation Patterns. Thereby, we are able to gain a new understanding of the apps through extracting knowledge about security permissions, their relations and possible anomalies, executing semantic search queries, finding relations between the description and the employed security permissions, or identifying clusters of similar apps. The paper describes the employed method and highlights its benefits in several analysis examples – e.g. screening the market for possible malicious apps that should be further investigated.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crestani, F.: Application of spreading activation techniques in information retrieval. Artificial Intelligence Review 11(6), 453–482 (1997)

    Article  Google Scholar 

  2. Fritzke, B.: A growing neural gas learns topologies. Advances in Neural Information Processing Systems (1), 1211–1216 (2005)

    Google Scholar 

  3. Lackner, G., Teufl, P., Weinberger, R.: User Tracking Based on Behavioral Fingerprints. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 76–95. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Qin, A.K., Suganthan, P.N.: Robust growing neural gas algorithm with application in cluster analysis. Neural Netw. 17(8-9), 1135–1148 (2004)

    Article  MATH  Google Scholar 

  5. Quillian, M.R.: Semantic Memory, vol. 2, ch.10, pp. 227–270. MIT Press (1968)

    Google Scholar 

  6. Teufl, P., Lackner, G.: RDF Data Analysis with Activation Patterns. In: Und Hermann Maurer, K.T. (ed.) Proceedings of the 10th International Conference on Knowledge Management and Knowledge Technologies, iKNOW 2010 Graz Austria, Journal of Computer Science (2010)

    Google Scholar 

  7. Teufl, P., Payer, U., Fellner, R.: Event correlation on the basis of activation patterns. In: Proceedings of the 18th Euromicro Conference on Parallel Distributed and NetworkBased Processing, PDP 2010, pp. 631–640 (2010)

    Google Scholar 

  8. Teufl, P., Payer, U., Parycek, P.: Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning. In: Macintosh, A., Tambouris, E. (eds.) ePart 2009. LNCS, vol. 5694, pp. 139–150. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Toninelli, A., Montanari, R., Lassila, O., Khushraj, D.: What’s on Users’ Minds? Toward a Usable Smart Phone Security Model. IEEE Pervasive Computing 8(2), 32–39 (2009)

    Article  Google Scholar 

  10. Vennon, T., Stroop, D.: Android Market: Threat Analysis of the Android Market (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Teufl, P. et al. (2012). Android Market Analysis with Activation Patterns. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30244-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30244-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30243-5

  • Online ISBN: 978-3-642-30244-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics