SlideShare a Scribd company logo
Generating Summary Risk Scores for Mobile Applications 
ABSTRACT: 
One of Android’s main defense mechanisms against malicious apps is a risk 
communication mechanism which, before a user installs an app, warns the user 
about the permissions the app requires, trusting that the user will make the right 
decision. This approach has been shown to be ineffective as it presents the risk 
information of each app in a “stand-alone” fashion and in a way that requires too 
much technical knowledge and time to distill useful information. We discuss the 
desired properties of risk signals and relative risk scores for Android apps in order 
to generate another metric that users can utilize when choosing apps. We present a 
wide range of techniques to generate both risk signals and risk scores that are 
based on heuristics as well as principled machine learning techniques. 
Experimental results conducted using real-world data sets show that these methods 
can effectively identify malware as very risky, are simple to understand, and easy 
to use. 
EXISTING SYSTEM: 
Android’s main defense mechanisms against malicious apps is a risk 
communication mechanism which warns the user about the permissions an app
requires before the app is installed by the user, trusting that the user will make the 
right decision. The specific approach used in Android has been shown to be 
ineffective at informing users about potential risks. The majority of Android apps 
request multiple permissions. When a user sees what appears to be the same 
warning message for almost every app. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Risk warnings quickly lose any effectiveness as the users are conditioned to 
ignore such warnings. 
 Used static analysis to determine whether an Android application is over 
privileged 
 The permission system is complex 
PROPOSED SYSTEM: 
In this paper, we investigate permission-based risk signals that use the rarity of 
critical permissions and pairs of critical permissions. In this approach, initially 
reported in permissions that have significant security or privacy impact are 
identified as critical, and if an app requests a critical permission (or a pair of 
critical permissions) that is rarely requested by apps in the same category as the
app, the app is labelled as risky. Using a binary risk signal, i.e., labelling each app 
as either risky or not risky. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The idea of risk score functions to improve risk communication for Android 
apps, and identify three desiderata for an effective risk scoring function. 
 We introduce a framework that includes both therarity based risk signals and 
probabilistic models, and explore other ways to instantiate the framework. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
 MOBILE : ANDROID
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7 
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse 
REFERENCE: 
Christopher S. Gates, Ninghui Li, Senior Member, IEEE, Hao Peng, Bhaskar 
Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Member, IEEE Computer 
Society, and Ian Molloy “Generating Summary Risk Scores for Mobile 
Applications” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE 
COMPUTING,VOL. 11,NO. 3, MAY-JUNE 2014.

More Related Content

PPT
Generating Risk Summary Risk Scores For Mobile Applications
DOCX
Effective risk communication for android apps
DOCX
Review of behavior malware analysis for android
PDF
Malware Bytes – Advanced Fault Analysis
PPTX
Android anti virus analysis
PDF
Challenges in Testing Mobile App Security
PDF
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
ODP
Mobile Apps Security Testing -1
Generating Risk Summary Risk Scores For Mobile Applications
Effective risk communication for android apps
Review of behavior malware analysis for android
Malware Bytes – Advanced Fault Analysis
Android anti virus analysis
Challenges in Testing Mobile App Security
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
Mobile Apps Security Testing -1

What's hot (18)

PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PPTX
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
DOC
Analysis of field data on web security vulnerabilities
PDF
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
PPTX
Effective Vulnerabilities Management in Simple Ten Steps
PPTX
Uses,mis uses and risk of software
PPTX
Uses , misuses and risk of software
PPTX
Assessment and Threats: Protecting Your Company from Cyber Attacks
PPTX
Threat modelling
PPTX
The New Data Security Risk
PDF
Covert compositional analysis of android inter app permission leakage
DOCX
Understandingphone sensor and app data for enhancing security
PDF
Whitepaper - CISO Guide_6pp
PPTX
Android application security unveiled
PDF
How to Identify Potentially Unwanted Applications
DOCX
JPA1404 Context-based Access Control Systems for Mobile Devices
PDF
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
IRJET - System to Identify and Define Security Threats to the users About The...
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
Analysis of field data on web security vulnerabilities
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
Effective Vulnerabilities Management in Simple Ten Steps
Uses,mis uses and risk of software
Uses , misuses and risk of software
Assessment and Threats: Protecting Your Company from Cyber Attacks
Threat modelling
The New Data Security Risk
Covert compositional analysis of android inter app permission leakage
Understandingphone sensor and app data for enhancing security
Whitepaper - CISO Guide_6pp
Android application security unveiled
How to Identify Potentially Unwanted Applications
JPA1404 Context-based Access Control Systems for Mobile Devices
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Ad

Viewers also liked (16)

DOCX
A framework for routing performance analysis in delay tolerant networks with ...
DOCX
Whole test suite generation
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
DOCX
Cloud mov cloud based mobile social tv
DOCX
Twitsper tweeting privately
DOCX
Social tube p2p assisted video sharing inonline social networks
DOCX
A novel data embedding method using adaptive pixel pair matching
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
A low complexity congestion control and scheduling algorithm for multihop wir...
PDF
2012 13 ieee dotnet titles- jp infotech
PDF
2015 2016 ieee java project titles
PPTX
Protecting location privacy in sensor networks against a global eavesdropper
DOCX
A secure erasure code based cloud storage system with secure data forwarding
DOC
2012-2013 IEEE JAVA PROJECT TITLES
DOCX
A distributed control law for load balancing in content delivery networks
PPTX
Packet hiding methods for preventing selective jamming attacks
A framework for routing performance analysis in delay tolerant networks with ...
Whole test suite generation
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Cloud mov cloud based mobile social tv
Twitsper tweeting privately
Social tube p2p assisted video sharing inonline social networks
A novel data embedding method using adaptive pixel pair matching
Back pressure-based packet-by-packet adaptive routing in communication networks
A low complexity congestion control and scheduling algorithm for multihop wir...
2012 13 ieee dotnet titles- jp infotech
2015 2016 ieee java project titles
Protecting location privacy in sensor networks against a global eavesdropper
A secure erasure code based cloud storage system with secure data forwarding
2012-2013 IEEE JAVA PROJECT TITLES
A distributed control law for load balancing in content delivery networks
Packet hiding methods for preventing selective jamming attacks
Ad

Similar to Generating summary risk scores for mobile applications (20)

PDF
Provide security about risk score in mobile application’s
PDF
Vulnerable Hunter
PPT
PPTX
Security in Android Application
PDF
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
PDF
A Framework for Providing Selective Permissions to Android Applications
PPTX
AndroidSecurityFirstEvaluationbyMJs.pptx
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
Android Malware Detection in Official and Third Party Application Stores
PDF
I018145157
PDF
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
PDF
IRJET- Android Malware Detection System
PDF
Permission based malware detection by using k means algorithm in Android OS
DOCX
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
PDF
Mobile Banking Security: Challenges, Solutions
PDF
Android_Nougats_security_issues_and_solutions.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
ACCUSE: Helping Users to minimize Android App Privacy Concerns
PDF
Brief Tour about Android Security
Provide security about risk score in mobile application’s
Vulnerable Hunter
Security in Android Application
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
A Framework for Providing Selective Permissions to Android Applications
AndroidSecurityFirstEvaluationbyMJs.pptx
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
Android Malware Detection in Official and Third Party Application Stores
I018145157
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IRJET- Android Malware Detection System
Permission based malware detection by using k means algorithm in Android OS
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Mobile Banking Security: Challenges, Solutions
Android_Nougats_security_issues_and_solutions.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
ACCUSE: Helping Users to minimize Android App Privacy Concerns
Brief Tour about Android Security

Generating summary risk scores for mobile applications

  • 1. Generating Summary Risk Scores for Mobile Applications ABSTRACT: One of Android’s main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the app requires, trusting that the user will make the right decision. This approach has been shown to be ineffective as it presents the risk information of each app in a “stand-alone” fashion and in a way that requires too much technical knowledge and time to distill useful information. We discuss the desired properties of risk signals and relative risk scores for Android apps in order to generate another metric that users can utilize when choosing apps. We present a wide range of techniques to generate both risk signals and risk scores that are based on heuristics as well as principled machine learning techniques. Experimental results conducted using real-world data sets show that these methods can effectively identify malware as very risky, are simple to understand, and easy to use. EXISTING SYSTEM: Android’s main defense mechanisms against malicious apps is a risk communication mechanism which warns the user about the permissions an app
  • 2. requires before the app is installed by the user, trusting that the user will make the right decision. The specific approach used in Android has been shown to be ineffective at informing users about potential risks. The majority of Android apps request multiple permissions. When a user sees what appears to be the same warning message for almost every app. DISADVANTAGES OF EXISTING SYSTEM:  Risk warnings quickly lose any effectiveness as the users are conditioned to ignore such warnings.  Used static analysis to determine whether an Android application is over privileged  The permission system is complex PROPOSED SYSTEM: In this paper, we investigate permission-based risk signals that use the rarity of critical permissions and pairs of critical permissions. In this approach, initially reported in permissions that have significant security or privacy impact are identified as critical, and if an app requests a critical permission (or a pair of critical permissions) that is rarely requested by apps in the same category as the
  • 3. app, the app is labelled as risky. Using a binary risk signal, i.e., labelling each app as either risky or not risky. ADVANTAGES OF PROPOSED SYSTEM:  The idea of risk score functions to improve risk communication for Android apps, and identify three desiderata for an effective risk scoring function.  We introduce a framework that includes both therarity based risk signals and probabilistic models, and explore other ways to instantiate the framework. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID
  • 4. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Christopher S. Gates, Ninghui Li, Senior Member, IEEE, Hao Peng, Bhaskar Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Member, IEEE Computer Society, and Ian Molloy “Generating Summary Risk Scores for Mobile Applications” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,VOL. 11,NO. 3, MAY-JUNE 2014.