Skip to main navigation Skip to search Skip to main content

Droidprotector: Preventing capability leak of android applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Both benign and malicious developers are attracted to Android platform because anyone is allowed to publish applications on the Android market. Such capability leak vulnerability on the Android platform may lead to permission elevation and privacy disclosure by making malware bypass Android security mechanism. This paper presents a code scanner tool-Droidprotector which is applied to help developers search bugs and focus on the business of applications rather than the security problems. Firstly, Markov blanket is used for feature selection. Secondly, source code is analyzed by a machine-leaning method. Finally, malicious intents and capability leaks are detected. By collecting 3482 applications and 59 source files to learn Markov blanket as the feature set and testing this code scanner tool, the experimental results show that DroidProtector can detect the vulnerability of Android source code effectively by using Markov blanket to select features correctly.

Original languageEnglish
Title of host publicationProceedings - 2017 International Conference on Green Informatics, ICGI 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages163-168
Number of pages6
ISBN (Electronic)9781538622803
DOIs
StatePublished - 21 Nov 2017
Event2017 International Conference on Green Informatics, ICGI 2017 - Fuzhou, China
Duration: 15 Aug 201717 Aug 2017

Publication series

NameProceedings - 2017 International Conference on Green Informatics, ICGI 2017

Conference

Conference2017 International Conference on Green Informatics, ICGI 2017
Country/TerritoryChina
CityFuzhou
Period15/08/1717/08/17

Keywords

  • Android Applications
  • Capability Leaks
  • Feature Selection
  • Markov blanket
  • Security

Fingerprint

Dive into the research topics of 'Droidprotector: Preventing capability leak of android applications'. Together they form a unique fingerprint.

Cite this