SlideShare a Scribd company logo
1 of 15
Download to read offline
ACCUSE: Helping Users to minimize Android App Privacy
Concerns
4th IEEE/ACM International Conference on Mobile Software Engineering and Systems
May 22-23, Buenos Aires (Argentina)
Presented by :
Majda Moussa, Giulio Antoniol, Massimiliano di Penta and Giovanni Beltrame
 Problem Statement: Why it is not like driving a car?
User Data
=
User
Developers
Apps
Approach ConclusionIntroduction Results
2
 ACCUSE
Python
Script
Androguard
Apps
Clustering
Permissions
Mapping
NRL
Risk
SYS
Risk
DGR
Risk
Play
Store
APK
File
Data Extraction
Module
Data Processing
Module
Risk Assessment
Module
Risk Assignment
Graph
DGR NRL
SYS
Apps metadata:
Descriptions
Downloads
Ratings
Permissions
Protection levels
ACCUSE: Android Confidentiality Concern User Support Environment
ConclusionResultsApproachIntroduction
3
 ACCUSE
Python
Script
Androguard
Apps
Clustering
Permissions
Mapping
NRL
Risk
SYS
Risk
DGR
Risk
Play
Store
APK
File
Data Extraction
Module
Data Processing
Module
Risk Assessment
Module
Risk Assignment
Graph
DGR NRL
SYS
Apps metadata:
Descriptions
Downloads
Ratings
Permissions
Protection levels
ACCUSE: Android Confidentiality Concern User Support Environment
ConclusionResultsApproachIntroduction
4
 ACCUSE
Python
Script
Androguard
Apps
Clustering
Permissions
Mapping
NRL
Risk
SYS
Risk
DGR
Risk
Play
Store
APK
File
Data Extraction
Module
Data Processing
Module
Risk Assessment
Module
Risk Assignment
Graph
DGR NRL
SYS
Apps metadata:
Descriptions
Downloads
Ratings
Permissions
Protection levels
ACCUSE: Android Confidentiality Concern User Support Environment
ConclusionResultsApproachIntroduction
5
 ACCUSE
Python
Script
Androguard
Apps
Clustering
Permissions
Mapping
NRL
Risk
SYS
Risk
DGR
Risk
Play
Store
APK
File
Data Extraction
Module
Data Processing
Module
Risk Assessment
Module
Risk Assignment
Graph
DGR NRL
SYS
Apps metadata:
Descriptions
Downloads
Ratings
Permissions
Protection levels
ACCUSE: Android Confidentiality Concern User Support Environment
ConclusionResultsApproachIntroduction
6
 Naïve approach App permissions
Normal permissions Dangerous permissions System permissions
PNRL
PDGR
PSYS
𝑂𝑐 𝑖 ∢ π‘‚π‘π‘π‘’π‘Ÿπ‘’π‘›π‘π‘’ π‘Ÿπ‘Žπ‘‘π‘’ π‘œπ‘“ π‘‘β„Žπ‘’ π‘π‘’π‘Ÿπ‘šπ‘–π‘ π‘ π‘–π‘œπ‘› 𝑖𝑛 π‘‘β„Žπ‘’ π‘π‘™π‘’π‘ π‘‘π‘’π‘Ÿ π‘œπ‘“ 𝐴𝑝𝑝𝑠 𝐢.
π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅 π‘Žπ‘π‘ = ෍
𝑖 πœ– 𝑃 𝐷𝐺𝑅
1 βˆ’ 𝑂𝑐 𝑖
ConclusionResultsApproachIntroduction
7
 Explicit users’ knowledge
π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅 π‘Žπ‘π‘ = 𝑅𝐹 βˆ— 𝑃𝐹 βˆ— ෍
𝑖 πœ– 𝑃 𝐷𝐺𝑅 π‘Žπ‘π‘
1 βˆ’ 𝑂 𝑐(𝑖
𝑅𝐹 = 1 βˆ’ 𝑏𝑅𝐹 π‘…π‘ π‘π‘Žπ‘™π‘’π‘‘(π‘Žπ‘π‘) 𝑃𝐹 = 1 βˆ’ 𝑏𝑅𝐹 𝐷𝑁(π‘Žπ‘π‘)
𝐷𝑁 π‘Žπ‘π‘ = 𝐼𝑁𝑇 255 βˆ—
log10(𝐷(π‘Žπ‘π‘))
6
/255
ConclusionResultsApproachIntroduction
8
π‘‡π‘œπ‘‘π‘Žπ‘™ π‘…π‘–π‘ π‘˜ π‘Žπ‘π‘ = π‘Š1 βˆ— π‘…π‘–π‘ π‘˜ 𝑁𝑅𝐿
2 + π‘Š2 βˆ— π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅
2
+ π‘Š3 βˆ— π‘…π‘–π‘ π‘˜ π‘†π‘Œπ‘†
2
 Risk computing
ConclusionResultsApproachIntroduction
9
For the 50 Malware apps: Compute the ranges [min R, max R], [min D, max D].
Generate 10 sub-intervals, out of the computed ranges, and record the
percentage (P) of the 50 apps in each subinterval .
According to P, compute RF and PF by generating random values for ratings and
downloads in the different sub-intervals.
➒ Market Dataset: ~ 11 700 apps form Google-Play.
➒ Malware Dataset: ~ 900 apps from VirusShare and ~ 50 form Google-Play.
 Datasets
 Missed Information for Malware dataset
ConclusionResultsApproachIntroduction
10
 To what extent apps with the same functionality exhibit different risk levels using ACCUSE?
ConclusionApproach ResultsIntroduction
11
 How does ACCUSE compare with the risk model proposed by Peng et al. [3]?
ConclusionApproach ResultsIntroduction
12
ACCUSE (RF and PF belief weights of 100% –w1 = 10, w2 = 100 and w3 =1000) compared to
the generative models (BNB, PNB and HMNB).
 How does ACCUSE compare with the risk model proposed by Peng et al. [3]?
ConclusionApproach ResultsIntroduction
13
AUC distribution obtained throughout the random generation process of malware
apps rating information.
 ACCUSE (Android Confidentiality Concern User Support systEm) allows:
 Work-in-progress is devoted to:
➒ Extend the study to further apps and malware.
➒ Assess the ACCUSE usefulness through a user study
➒ Implement it as a real-time social media feedback mechanisms.
➒ differently weighting the importance of different classes of Android
permissions.
➒ damping the risk of apps based on their rating and popularity.
➒ plotting the risk using heat colors in a three dimensional space (NORMAL,
DANGEROUS and SYSTEM risk).
ResultsApproach ConclusionIntroduction
14
Questions?

More Related Content

Similar to ACCUSE: Helping Users to minimize Android App Privacy Concerns

DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...csandit
Β 
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...MOBIQUANT TECHNOLOGIES
Β 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
Β 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
Β 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applicationsijtsrd
Β 
I03402059063
I03402059063I03402059063
I03402059063theijes
Β 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
Β 
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...IJCSIS Research Publications
Β 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
Β 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
Β 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxinfantsuk
Β 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
Β 
Malware detection and pattern classification using NPL
Malware detection and pattern classification using NPLMalware detection and pattern classification using NPL
Malware detection and pattern classification using NPLIRJET Journal
Β 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
Β 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Jorge Cardoso
Β 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
Β 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSIAEME Publication
Β 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTtsysglobalsolutions
Β 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
Β 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
Β 

Similar to ACCUSE: Helping Users to minimize Android App Privacy Concerns (20)

DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
Β 
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Pileup Flaws: Vulnerabilities in Android Update Make All Android Devices Vuln...
Β 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
Β 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
Β 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
Β 
I03402059063
I03402059063I03402059063
I03402059063
Β 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
Β 
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Β 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
Β 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
Β 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
Β 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
Β 
Malware detection and pattern classification using NPL
Malware detection and pattern classification using NPLMalware detection and pattern classification using NPL
Malware detection and pattern classification using NPL
Β 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
Β 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Β 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
Β 
DEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICSDEFECT PREDICTION USING ORDER STATISTICS
DEFECT PREDICTION USING ORDER STATISTICS
Β 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
Β 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
Β 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
Β 

More from MobileSoft

Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...
Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...
Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...MobileSoft
Β 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...MobileSoft
Β 
A Framework for Regression Testing of Outdoor Mobile Applications
A Framework for Regression Testing of Outdoor Mobile ApplicationsA Framework for Regression Testing of Outdoor Mobile Applications
A Framework for Regression Testing of Outdoor Mobile ApplicationsMobileSoft
Β 
Who Changed You? Obfuscator Identification for Android
Who Changed You? Obfuscator Identification for AndroidWho Changed You? Obfuscator Identification for Android
Who Changed You? Obfuscator Identification for AndroidMobileSoft
Β 
Mobile App Development and Management: Results from a Qualitative Investigation
Mobile App Development and Management: Results from a Qualitative InvestigationMobile App Development and Management: Results from a Qualitative Investigation
Mobile App Development and Management: Results from a Qualitative InvestigationMobileSoft
Β 
Towards Mobile Twin Peaks for App Development
Towards Mobile Twin Peaks for App DevelopmentTowards Mobile Twin Peaks for App Development
Towards Mobile Twin Peaks for App DevelopmentMobileSoft
Β 
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringLeafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringMobileSoft
Β 
Same App, Different App Stores: A comparative Study
Same App, Different App Stores: A comparative StudySame App, Different App Stores: A comparative Study
Same App, Different App Stores: A comparative StudyMobileSoft
Β 
Performance-based Guidelines for Energy-efficient Mobile Applications
Performance-based Guidelines for Energy-efficient Mobile ApplicationsPerformance-based Guidelines for Energy-efficient Mobile Applications
Performance-based Guidelines for Energy-efficient Mobile ApplicationsMobileSoft
Β 
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...MobileSoft
Β 
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...MobileSoft
Β 
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringLeafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringMobileSoft
Β 
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile Apps
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile AppsIFMLEdit.org: Model Driven Rapid Prototyping of Mobile Apps
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile AppsMobileSoft
Β 
Performance-based Guidelines for Energy Efficient Mobile Applications
Performance-based Guidelines for Energy Efficient Mobile ApplicationsPerformance-based Guidelines for Energy Efficient Mobile Applications
Performance-based Guidelines for Energy Efficient Mobile ApplicationsMobileSoft
Β 
Towards Architectural Styles for Android App Software Product Lines
Towards Architectural Styles for Android App Software Product LinesTowards Architectural Styles for Android App Software Product Lines
Towards Architectural Styles for Android App Software Product LinesMobileSoft
Β 
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...MobileSoft
Β 
Authoring Tool for Location-based Learning Experiences
Authoring Tool for Location-based Learning ExperiencesAuthoring Tool for Location-based Learning Experiences
Authoring Tool for Location-based Learning ExperiencesMobileSoft
Β 
Automatically Locating Malicious Packages in Piggybacked Android Apps
Automatically Locating Malicious Packages in Piggybacked Android AppsAutomatically Locating Malicious Packages in Piggybacked Android Apps
Automatically Locating Malicious Packages in Piggybacked Android AppsMobileSoft
Β 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile securityMobileSoft
Β 
Processing in Mobile Applications: A Case Study
Processing in Mobile Applications: A Case StudyProcessing in Mobile Applications: A Case Study
Processing in Mobile Applications: A Case StudyMobileSoft
Β 

More from MobileSoft (20)

Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...
Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...
Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Co...
Β 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...
Β 
A Framework for Regression Testing of Outdoor Mobile Applications
A Framework for Regression Testing of Outdoor Mobile ApplicationsA Framework for Regression Testing of Outdoor Mobile Applications
A Framework for Regression Testing of Outdoor Mobile Applications
Β 
Who Changed You? Obfuscator Identification for Android
Who Changed You? Obfuscator Identification for AndroidWho Changed You? Obfuscator Identification for Android
Who Changed You? Obfuscator Identification for Android
Β 
Mobile App Development and Management: Results from a Qualitative Investigation
Mobile App Development and Management: Results from a Qualitative InvestigationMobile App Development and Management: Results from a Qualitative Investigation
Mobile App Development and Management: Results from a Qualitative Investigation
Β 
Towards Mobile Twin Peaks for App Development
Towards Mobile Twin Peaks for App DevelopmentTowards Mobile Twin Peaks for App Development
Towards Mobile Twin Peaks for App Development
Β 
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringLeafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Β 
Same App, Different App Stores: A comparative Study
Same App, Different App Stores: A comparative StudySame App, Different App Stores: A comparative Study
Same App, Different App Stores: A comparative Study
Β 
Performance-based Guidelines for Energy-efficient Mobile Applications
Performance-based Guidelines for Energy-efficient Mobile ApplicationsPerformance-based Guidelines for Energy-efficient Mobile Applications
Performance-based Guidelines for Energy-efficient Mobile Applications
Β 
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...
Towards Native Code Offloading Platforms for Image Processing in Mobile Appli...
Β 
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...
Assessing the Impact of Service Workers on the Energy Efficiency of Progressi...
Β 
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic RefactoringLeafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Leafactor: Improving Energy Efficiency of Android Apps via Automatic Refactoring
Β 
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile Apps
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile AppsIFMLEdit.org: Model Driven Rapid Prototyping of Mobile Apps
IFMLEdit.org: Model Driven Rapid Prototyping of Mobile Apps
Β 
Performance-based Guidelines for Energy Efficient Mobile Applications
Performance-based Guidelines for Energy Efficient Mobile ApplicationsPerformance-based Guidelines for Energy Efficient Mobile Applications
Performance-based Guidelines for Energy Efficient Mobile Applications
Β 
Towards Architectural Styles for Android App Software Product Lines
Towards Architectural Styles for Android App Software Product LinesTowards Architectural Styles for Android App Software Product Lines
Towards Architectural Styles for Android App Software Product Lines
Β 
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...
CheckDroid: A Tool for Automated Detection of Bad Practices in Android Applic...
Β 
Authoring Tool for Location-based Learning Experiences
Authoring Tool for Location-based Learning ExperiencesAuthoring Tool for Location-based Learning Experiences
Authoring Tool for Location-based Learning Experiences
Β 
Automatically Locating Malicious Packages in Piggybacked Android Apps
Automatically Locating Malicious Packages in Piggybacked Android AppsAutomatically Locating Malicious Packages in Piggybacked Android Apps
Automatically Locating Malicious Packages in Piggybacked Android Apps
Β 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile security
Β 
Processing in Mobile Applications: A Case Study
Processing in Mobile Applications: A Case StudyProcessing in Mobile Applications: A Case Study
Processing in Mobile Applications: A Case Study
Β 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
Β 
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online β˜‚οΈ
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online  β˜‚οΈCALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online  β˜‚οΈ
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online β˜‚οΈanilsa9823
Β 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
Β 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
Β 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
Β 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
Β 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
Β 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
Β 
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...Steffen Staab
Β 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
Β 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
Β 
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
Β 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
Β 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
Β 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
Β 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
Β 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
Β 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
Β 

Recently uploaded (20)

CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )πŸ” 9953056974πŸ”(=)/CALL GIRLS SERVICE
Β 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Β 
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online β˜‚οΈ
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online  β˜‚οΈCALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online  β˜‚οΈ
CALL ON βž₯8923113531 πŸ”Call Girls Kakori Lucknow best sexual service Online β˜‚οΈ
Β 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
Β 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Β 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Β 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
Β 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Β 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
Β 
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data SpacesΒ - and Epistemic Querying of RDF-...
Β 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
Β 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
Β 
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON βž₯8923113531 πŸ”Call Girls Badshah Nagar Lucknow best Female service
Β 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
Β 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Β 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Β 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
Β 
Vip Call Girls Noida ➑️ Delhi ➑️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➑️ Delhi ➑️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➑️ Delhi ➑️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➑️ Delhi ➑️ 9999965857 No Advance 24HRS Live
Β 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Β 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
Β 

ACCUSE: Helping Users to minimize Android App Privacy Concerns

  • 1. ACCUSE: Helping Users to minimize Android App Privacy Concerns 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems May 22-23, Buenos Aires (Argentina) Presented by : Majda Moussa, Giulio Antoniol, Massimiliano di Penta and Giovanni Beltrame
  • 2.  Problem Statement: Why it is not like driving a car? User Data = User Developers Apps Approach ConclusionIntroduction Results 2
  • 3.  ACCUSE Python Script Androguard Apps Clustering Permissions Mapping NRL Risk SYS Risk DGR Risk Play Store APK File Data Extraction Module Data Processing Module Risk Assessment Module Risk Assignment Graph DGR NRL SYS Apps metadata: Descriptions Downloads Ratings Permissions Protection levels ACCUSE: Android Confidentiality Concern User Support Environment ConclusionResultsApproachIntroduction 3
  • 4.  ACCUSE Python Script Androguard Apps Clustering Permissions Mapping NRL Risk SYS Risk DGR Risk Play Store APK File Data Extraction Module Data Processing Module Risk Assessment Module Risk Assignment Graph DGR NRL SYS Apps metadata: Descriptions Downloads Ratings Permissions Protection levels ACCUSE: Android Confidentiality Concern User Support Environment ConclusionResultsApproachIntroduction 4
  • 5.  ACCUSE Python Script Androguard Apps Clustering Permissions Mapping NRL Risk SYS Risk DGR Risk Play Store APK File Data Extraction Module Data Processing Module Risk Assessment Module Risk Assignment Graph DGR NRL SYS Apps metadata: Descriptions Downloads Ratings Permissions Protection levels ACCUSE: Android Confidentiality Concern User Support Environment ConclusionResultsApproachIntroduction 5
  • 6.  ACCUSE Python Script Androguard Apps Clustering Permissions Mapping NRL Risk SYS Risk DGR Risk Play Store APK File Data Extraction Module Data Processing Module Risk Assessment Module Risk Assignment Graph DGR NRL SYS Apps metadata: Descriptions Downloads Ratings Permissions Protection levels ACCUSE: Android Confidentiality Concern User Support Environment ConclusionResultsApproachIntroduction 6
  • 7.  NaΓ―ve approach App permissions Normal permissions Dangerous permissions System permissions PNRL PDGR PSYS 𝑂𝑐 𝑖 ∢ π‘‚π‘π‘π‘’π‘Ÿπ‘’π‘›π‘π‘’ π‘Ÿπ‘Žπ‘‘π‘’ π‘œπ‘“ π‘‘β„Žπ‘’ π‘π‘’π‘Ÿπ‘šπ‘–π‘ π‘ π‘–π‘œπ‘› 𝑖𝑛 π‘‘β„Žπ‘’ π‘π‘™π‘’π‘ π‘‘π‘’π‘Ÿ π‘œπ‘“ 𝐴𝑝𝑝𝑠 𝐢. π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅 π‘Žπ‘π‘ = ෍ 𝑖 πœ– 𝑃 𝐷𝐺𝑅 1 βˆ’ 𝑂𝑐 𝑖 ConclusionResultsApproachIntroduction 7
  • 8.  Explicit users’ knowledge π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅 π‘Žπ‘π‘ = 𝑅𝐹 βˆ— 𝑃𝐹 βˆ— ෍ 𝑖 πœ– 𝑃 𝐷𝐺𝑅 π‘Žπ‘π‘ 1 βˆ’ 𝑂 𝑐(𝑖 𝑅𝐹 = 1 βˆ’ 𝑏𝑅𝐹 π‘…π‘ π‘π‘Žπ‘™π‘’π‘‘(π‘Žπ‘π‘) 𝑃𝐹 = 1 βˆ’ 𝑏𝑅𝐹 𝐷𝑁(π‘Žπ‘π‘) 𝐷𝑁 π‘Žπ‘π‘ = 𝐼𝑁𝑇 255 βˆ— log10(𝐷(π‘Žπ‘π‘)) 6 /255 ConclusionResultsApproachIntroduction 8
  • 9. π‘‡π‘œπ‘‘π‘Žπ‘™ π‘…π‘–π‘ π‘˜ π‘Žπ‘π‘ = π‘Š1 βˆ— π‘…π‘–π‘ π‘˜ 𝑁𝑅𝐿 2 + π‘Š2 βˆ— π‘…π‘–π‘ π‘˜ 𝐷𝐺𝑅 2 + π‘Š3 βˆ— π‘…π‘–π‘ π‘˜ π‘†π‘Œπ‘† 2  Risk computing ConclusionResultsApproachIntroduction 9
  • 10. For the 50 Malware apps: Compute the ranges [min R, max R], [min D, max D]. Generate 10 sub-intervals, out of the computed ranges, and record the percentage (P) of the 50 apps in each subinterval . According to P, compute RF and PF by generating random values for ratings and downloads in the different sub-intervals. ➒ Market Dataset: ~ 11 700 apps form Google-Play. ➒ Malware Dataset: ~ 900 apps from VirusShare and ~ 50 form Google-Play.  Datasets  Missed Information for Malware dataset ConclusionResultsApproachIntroduction 10
  • 11.  To what extent apps with the same functionality exhibit different risk levels using ACCUSE? ConclusionApproach ResultsIntroduction 11
  • 12.  How does ACCUSE compare with the risk model proposed by Peng et al. [3]? ConclusionApproach ResultsIntroduction 12 ACCUSE (RF and PF belief weights of 100% –w1 = 10, w2 = 100 and w3 =1000) compared to the generative models (BNB, PNB and HMNB).
  • 13.  How does ACCUSE compare with the risk model proposed by Peng et al. [3]? ConclusionApproach ResultsIntroduction 13 AUC distribution obtained throughout the random generation process of malware apps rating information.
  • 14.  ACCUSE (Android Confidentiality Concern User Support systEm) allows:  Work-in-progress is devoted to: ➒ Extend the study to further apps and malware. ➒ Assess the ACCUSE usefulness through a user study ➒ Implement it as a real-time social media feedback mechanisms. ➒ differently weighting the importance of different classes of Android permissions. ➒ damping the risk of apps based on their rating and popularity. ➒ plotting the risk using heat colors in a three dimensional space (NORMAL, DANGEROUS and SYSTEM risk). ResultsApproach ConclusionIntroduction 14