of the 9 proposed security rules are independent of
known malware request pattern, while 3 depends par-
tially on identified request patterns. Our analysis thus
provides a vision regarding the use of security rules
that are not completely dependent on known permis-
sion request patterns for the detection of malapps.
6 CONCLUSION
We have investigated the feasibility of characterizing
app behaviour using risk ratings from proposed im-
pact levels of Android permission. We demonstrate
that the risk signals can be used to assist layman users
in their security evaluation of Android apps. The first
rating is the sensitivity index of the app based on the
impact levels of requested permissions, the second ra-
ting is on its permission request compared to similar
apps, while the last rating is on its permission that
characterizes class label of apps as benign or malici-
ous. Our result demonstrates that the proposed fra-
mework can be used to improve risk signalling of An-
droid apps with a 95% accuracy.
For risk signalling, the ratings provide a measure
of awareness and scrutiny as a user defence against
malicious applications. For malware detection, a de-
tailed knowledge of app behaviour is essential for
signatures. Existing approaches and future analysis
could incorporate these ratings as the first phase in
prioritizing, especially when a large dataset of apps is
involved. For future work, we are exploring features
to make the risk ratings adjustable to contextual fac-
tors, such as actual usage of permissions in the source
code.
REFERENCES
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H.,
Rieck, K., and Siemens, C. (2014). Drebin: Effective
and explainable detection of android malware in your
pocket. In Ndss, volume 14, pages 23–26.
Au, K. W. Y., Zhou, Y. F., Huang, Z., and Lie, D. (2012).
Pscout: analyzing the android permission specifica-
tion. In Proceedings of the 2012 ACM conference on
Computer and communications security, pages 217–
228. ACM.
Barrera, D., Kayacik, H. G., van Oorschot, P. C., and So-
mayaji, A. (2010). A methodology for empirical ana-
lysis of permission-based security models and its ap-
plication to android. In Proceedings of the 17th ACM
conference on Computer and communications secu-
rity, pages 73–84. ACM.
Chia, P. H., Yamamoto, Y., and Asokan, N. (2012). Is this
app safe?: a large scale study on application permissi-
ons and risk signals. In Proceedings of the 21st inter-
national conference on World Wide Web, pages 311–
320. ACM.
Enck, W., Octeau, D., McDaniel, P. D., and Chaudhuri, S.
(2011). A study of android application security. In
USENIX security symposium, volume 2, page 2.
Enck, W., Ongtang, M., and McDaniel, P. (2009). On light-
weight mobile phone application certification. In Pro-
ceedings of the 16th ACM conference on Computer
and communications security, pages 235–245. ACM.
Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D.
(2011a). Android permissions demystified. In Procee-
dings of the 18th ACM conference on Computer and
communications security, pages 627–638. ACM.
Felt, A. P., Egelman, S., and Wagner, D. (2012a). I’ve got 99
problems, but vibration ain’t one: a survey of smartp-
hone users’ concerns. In Proceedings of the second
ACM workshop on Security and privacy in smartpho-
nes and mobile devices, pages 33–44. ACM.
Felt, A. P., Finifter, M., Chin, E., Hanna, S., and Wagner,
D. (2011b). A survey of mobile malware in the wild.
In Proceedings of the 1st ACM workshop on Security
and privacy in smartphones and mobile devices, pages
3–14. ACM.
Felt, A. P., Greenwood, K., and Wagner, D. (2011c). The
effectiveness of application permissions. In Procee-
dings of the 2nd USENIX conference on Web applica-
tion development, pages 7–7.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012b). Android permissions: User at-
tention, comprehension, and behavior. In Proceedings
of the eighth symposium on usable privacy and secu-
rity, page 3. ACM.
Frank, M., Dong, B., Felt, A. P., and Song, D. (2012). Mi-
ning permission request patterns from android and fa-
cebook applications. In Data Mining (ICDM), 2012
IEEE 12th International Conference on, pages 870–
875. IEEE.
Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh,
N., and Wetherall, D. (2012). A conundrum of permis-
sions: installing applications on an android smartp-
hone. In International Conference on Financial Cryp-
tography and Data Security, pages 68–79. Springer.
Kelly, G. (2014). Report: 97% of mobile malware is on
android. this is the easy way you stay safe. Forbes
Tech.
King, J., Lampinen, A., and Smolen, A. (2011). Privacy: Is
there an app for that? In Proceedings of the Seventh
Symposium on Usable Privacy and Security, page 12.
ACM.
Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R.,
Nita-Rotaru, C., and Molloy, I. (2012). Using proba-
bilistic generative models for ranking risks of android
apps. In Proceedings of the 2012 ACM conference on
Computer and communications security, pages 241–
252. ACM.
Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru,
C., and Molloy, I. (2012). Android permissions: a
perspective combining risks and benefits. In Procee-
Permission-based Risk Signals for App Behaviour Characterization in Android Apps
191