Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105614
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorYu, L-
dc.creatorLuo, X-
dc.creatorQian, C-
dc.creatorWang, S-
dc.creatorLeung, HKN-
dc.date.accessioned2024-04-15T07:35:24Z-
dc.date.available2024-04-15T07:35:24Z-
dc.identifier.issn0098-5589-
dc.identifier.urihttp://hdl.handle.net/10397/105614-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication L. Yu, X. Luo, C. Qian, S. Wang and H. K. N. Leung, "Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy," in IEEE Transactions on Software Engineering, vol. 44, no. 9, pp. 834-854, 1 Sept. 2018 is available at https://doi.org/10.1109/TSE.2017.2730198.en_US
dc.subjectMobile applicationsen_US
dc.subjectPrivacy policyen_US
dc.titleEnhancing the description-to-behavior fidelity in Android apps with privacy policyen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage834-
dc.identifier.epage854-
dc.identifier.volume44-
dc.identifier.issue9-
dc.identifier.doi10.1109/TSE.2017.2730198-
dcterms.abstractSince more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps. As malware is becoming more complicated and stealthy, recent research proposed a promising detection approach that looks for the inconsistency between an app's permissions and its description. In this paper, we first revisit this approach and reveal that using description and permission will lead to many false positives because descriptions often fail to declare all sensitive operations. Then, we propose exploiting an app's privacy policy and its bytecode to enhance the malware detection based on description and permissions. It is non-trivial to automatically analyze privacy policy and perform the cross-verification among these four kinds of software artifacts including, privacy policy, bytecode, description, and permissions. To address these challenging issues, we first propose a novel data flow model for analyzing privacy policy, and then develop a new system, named TAPVerifier, for carrying out investigation of individual software artifacts and conducting the cross-verification. The experimental results show that TAPVerifier can analyze privacy policy with a high accuracy and recall rate. More importantly, integrating privacy policy and bytecode level information can remove up to 59.4 percent false alerts of the state-of-the-art systems, such as AutoCog, CHABADA, etc.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE transactions on software engineering, Sept 2018, v. 44, no. 9, p. 834-854-
dcterms.isPartOfIEEE transactions on software engineering-
dcterms.issued2018-09-
dc.identifier.scopus2-s2.0-85028931155-
dc.identifier.eissn1939-3520-
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-0839en_US
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS26083841en_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Yu_Enhancing_Description-To-Behavior_Fidelity.pdfPre-Published version1.7 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

16
Citations as of Jun 30, 2024

Downloads

1
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

41
Citations as of Jul 4, 2024

WEB OF SCIENCETM
Citations

35
Citations as of Jul 4, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.