SlideShare a Scribd company logo
1 of 14
Sangho Lee
School of IntegratedTechnology,
Yonsei University
 Introduction
 Maximum Severity Rating (MSR)
Classification
 EnhancedVisualization of Permission set
 Experimental results
 Limitation
 Conclusion
 Q & A
 Android is widely spreading among Smartphone users, its security
threats are also increasing immensely
 In permission model based OS, malicious applications can only
execute malfunctions with previously granted permissions
 Attackers require more permissions than what the normal
applications need.
 Example> accessing call log, sending SMS and reading contact
information
 Our method focuses especially on the procedure of permission
agreement, and concentrate to help the users verifying an
application properly with rejection of a malicious application.
 Maximum Severity Rating (MSR) classification
attempts to find malicious applications by examining
requested permissions.
 MSR classification calculates the permissions set of an
application to inform whether it is malicious or not to
the user
 Our method assists the users who do not have
sufficient knowledge about a permission-based
security model.
 The final decision to install an application is to be made by
a user
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
25
25
1

 i
i
xMR
xMRrMR
Avg , rMR is sample difference ratio
25
25
1

 i
i
xNR
xNRrNR
Avg , rNR is sample difference ratio
 An application is indicated as a malicious
application if average value of normal
application is less than malicious application
 Otherwise, it is recognized as a clean
application
 Enhanced visualization based on improved
user interface can lead the users more
cognitive to the risks
 A user interface of permission agreement
screen which is redesigned for enhancement
of the ratio to make the right decision
Clean Malicious
 Need more samples to conduct more
accurate experimental result.
 We used 2 clean / 1 malicious sample apps
 How to collect malicious app samples?
 Maximum Severity Rating(MSR) classification
to indicate a comprehensive assessment of
an application
 Enhanced visualization with redesign of a
permission-grant screen to assist an
improvement of right decisions from the
users
A novel method to avoid malicious applications on Android

More Related Content

Similar to A novel method to avoid malicious applications on Android

Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
JPINFOTECH JAYAPRAKASH
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
ITIIIndustries
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
Tyler Shields
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
BRNSSPublicationHubI
 

Similar to A novel method to avoid malicious applications on Android (20)

Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
 
Generating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile ApplicationsGenerating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile Applications
 
Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...Improved cross-platform accessibility of a flagship application for world's l...
Improved cross-platform accessibility of a flagship application for world's l...
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
Managed End Point security
Managed End Point securityManaged End Point security
Managed End Point security
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Network Detection & Response Services in India.pdf
Network Detection & Response Services in India.pdfNetwork Detection & Response Services in India.pdf
Network Detection & Response Services in India.pdf
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Reduce, reclaim and recycle your software to deliver dramatic cost reductions
Reduce, reclaim and recycle your software to deliver dramatic cost reductionsReduce, reclaim and recycle your software to deliver dramatic cost reductions
Reduce, reclaim and recycle your software to deliver dramatic cost reductions
 
Cybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply ChainCybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply Chain
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

A novel method to avoid malicious applications on Android

  • 1. Sangho Lee School of IntegratedTechnology, Yonsei University
  • 2.  Introduction  Maximum Severity Rating (MSR) Classification  EnhancedVisualization of Permission set  Experimental results  Limitation  Conclusion  Q & A
  • 3.  Android is widely spreading among Smartphone users, its security threats are also increasing immensely  In permission model based OS, malicious applications can only execute malfunctions with previously granted permissions  Attackers require more permissions than what the normal applications need.  Example> accessing call log, sending SMS and reading contact information  Our method focuses especially on the procedure of permission agreement, and concentrate to help the users verifying an application properly with rejection of a malicious application.
  • 4.
  • 5.  Maximum Severity Rating (MSR) classification attempts to find malicious applications by examining requested permissions.  MSR classification calculates the permissions set of an application to inform whether it is malicious or not to the user  Our method assists the users who do not have sufficient knowledge about a permission-based security model.  The final decision to install an application is to be made by a user
  • 6. 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio
  • 7. 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio
  • 8. 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio 25 25 1   i i xMR xMRrMR Avg , rMR is sample difference ratio 25 25 1   i i xNR xNRrNR Avg , rNR is sample difference ratio
  • 9.  An application is indicated as a malicious application if average value of normal application is less than malicious application  Otherwise, it is recognized as a clean application
  • 10.  Enhanced visualization based on improved user interface can lead the users more cognitive to the risks  A user interface of permission agreement screen which is redesigned for enhancement of the ratio to make the right decision
  • 12.  Need more samples to conduct more accurate experimental result.  We used 2 clean / 1 malicious sample apps  How to collect malicious app samples?
  • 13.  Maximum Severity Rating(MSR) classification to indicate a comprehensive assessment of an application  Enhanced visualization with redesign of a permission-grant screen to assist an improvement of right decisions from the users