Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105730
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | en_US |
| dc.creator | Yu, L | en_US |
| dc.creator | Luo, X | en_US |
| dc.creator | Qian, C | en_US |
| dc.creator | Wang, S | en_US |
| dc.date.accessioned | 2024-04-15T07:36:17Z | - |
| dc.date.available | 2024-04-15T07:36:17Z | - |
| dc.identifier.isbn | 978-1-5090-1855-0 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/105730 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
| dc.rights | The following publication L. Yu, X. Luo, C. Qian and S. Wang, "Revisiting the Description-to-Behavior Fidelity in Android Applications," 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Osaka, Japan, 2016, pp. 415-426 is available at https://doi.org/10.1109/SANER.2016.67. | en_US |
| dc.title | Revisiting the description-to-behavior fidelity in Android applications | en_US |
| dc.type | Conference Paper | en_US |
| dc.identifier.spage | 415 | en_US |
| dc.identifier.epage | 426 | en_US |
| dc.identifier.volume | 1 | en_US |
| dc.identifier.doi | 10.1109/SANER.2016.67 | en_US |
| dcterms.abstract | Since more than 96% of mobile malware targets on Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious applications. As malware is becoming more complicated and stealthy, recent research proposed a promising detection approach that looks for the inconsistency between an application's permissions and its description. In this paper, we revisit this approach and find that using description and permission will lead to many false positives. Therefore, we propose employing app's privacy policy and its bytecode to enhance description and permission for malware detection. It is non-trivial to automatically analyze privacy policy and perform the cross-verification among these four kinds of software artifacts including, privacy policy, bytecode, description, and permissions. We propose a novel data flow model for analyzing privacy policy, and develop a novel system, named TAPVerifier, for carrying out investigation of individual software artifacts and conducting the cross-verification. The experimental results show that TAPVerifier can analyze privacy policy with a high accuracy and recall rate. More importantly, integrating privacy policy and code level information removes 8.1%-65.5% false positives of existing systems based on description and permission. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 14–18 March 2016, Osaka, Japan, v. 1, p. 415-426 | en_US |
| dcterms.issued | 2016 | - |
| dc.identifier.scopus | 2-s2.0-85007338718 | - |
| dc.relation.conference | IEEE International Conference on Software Analysis, Evolution and Reengineering [SANER] | en_US |
| dc.description.validate | 202402 bcch | en_US |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | COMP-1650 | - |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | National Natural Science Foundation of China; HKPolyU Research Grant; Hong Kong ITF | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.identifier.OPUS | 9617621 | - |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Conference Paper | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Luo_Revisiting_Description-To-Behavior_Fidelity.pdf | Pre-Published version | 818.46 kB | Adobe PDF | View/Open |
Page views
116
Last Week
5
5
Last month
Citations as of Nov 9, 2025
Downloads
71
Citations as of Nov 9, 2025
SCOPUSTM
Citations
27
Citations as of Dec 19, 2025
WEB OF SCIENCETM
Citations
18
Citations as of Dec 18, 2025
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



