Acknowledgement
We want to express our appreciation to the Universiti Teknikal Malaysia Melaka (UTeM) for their constant support in getting the authors to publish this work.
References
- StatCounter, "Mobile Operating System Market Share Worldwide," StatCounter, 2021. .
- W. J. Buchanan, S. Chiale, and R. Macfarlane, "A methodology for the security evaluation within third-party Android Marketplaces," Digit. Investig., vol. 23, pp. 88-98, 2017. https://doi.org/10.1016/j.diin.2017.10.002
- F. Martinelli, F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, "Identifying mobile repackaged applications through formal methods," ICISSP 2017 - Proc. 3rd Int. Conf. Inf. Syst. Secur. Priv., vol. 2017-Janua, no. Icissp, pp. 673-682, 2017.
- S. Kandukuru and R. M. Sharma, "Android malicious application detection using permission vector and network traffic analysis," 2017 2nd Int. Conf. Converg. Technol. I2CT 2017, vol. 2017-Janua, pp. 1126-1132, 2017.
- J. Duarte, "A Survey of Android Attacks Detection Techniques," in Digital Privacy and Security Conference (DPSC), 2020, no. February, pp. 106-117.
- C. Chen, J. Lin, and G.-H. Lai, "Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code," in International Conference on Trustworthy Systems and their Applications Detecting, 2014, pp. 1-6.
- W. Wang, Z. Gao, M. Zhao, Y. Li, J. Liu, and X. Zhang, "DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features," IEEE Access, vol. 6, no. c, pp. 31798-31807, 2018. https://doi.org/10.1109/ACCESS.2018.2835654
- G. Kirubavathi and R. Anitha, "Structural analysis and detection of android botnets using machine learning techniques," Int. J. Inf. Secur., vol. 17, no. 2, pp. 153-167, 2018. https://doi.org/10.1007/s10207-017-0363-3
- P. Feng, J. MA, C. SUN, X. XU1, and Y. MA, "A Novel Dynamic Android Malware Detection System With Ensemble Learning," IEEE Trans. JOURNALS, vol. 4, no. c, 2018.
- F. M. Faqiry, "Scrutinizing Permission Based Attack on Android Os Platform Devices," Int. J. Adv. Res. Comput. Sci., vol. 8, no. 7, pp. 421-426, 2017. https://doi.org/10.26483/ijarcs.v8i7.4212
- V. Kouliaridis, G. Kambourakis, D. Geneiatakis, and N. Potha, "Two anatomists are better than one-Dual-level android malware detection," Symmetry (Basel)., vol. 12, no. 7, pp. 1-21, 2020.
- M. Al Ali, D. Svetinovic, Z. Aung, and S. Lukman, "Malware Detection in Android Mobile Platform using Machine Learning Algorithms," in International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017, pp. 4-9.
- P. Yan and Z. Yan, "A survey on dynamic mobile malware detection," Softw. Qual. J., vol. 26, no. 3, pp. 1-31, 2017.
- A. K. Chakravarty and S. Paul, "A study of signaturebased and behaviour-based malware detection approaches," Int. J. Adv. Res. Ideas Innov. Technol. ISSN, vol. 5, no. 3, pp. 1509-1511, 2019.
- D. O. Sahin, O. E. Kural, S. Akleylek, and E. Kilic, "A novel permission-based Android malware detection system using feature selection based on linear regression," Neural Comput. Appl., vol. 1, p. 5875, 2021.
- P. Wijesekera, A. Baokar, L. Tsai, and J. Reardon, "The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences," Proc. - IEEE Symp. Secur. Priv., pp. 1077-1093, 2017.
- Z. Abdullah and M. M. Saudi, "RAPID-Risk Assessment of Android Permission and Application Programming Interface ( API ) Call for Android Botnet," no. October, 2018.
- H. Bagheri, E. Kang, S. Malek, and D. Jackson, "A formal approach for detection of security flaws in the android permission system," Form. Asp. Comput., vol. 30, no. 5, pp. 525-544, 2018. https://doi.org/10.1007/s00165-017-0445-z
- B. F. Demissie, M. Ceccato, and L. K. Shar, "Security analysis of permission re-delegation vulnerabilities in Android apps," Empir. Softw. Eng., vol. 25, no. 6, pp. 5084-5136, 2020. https://doi.org/10.1007/s10664-020-09879-8
- M. W. Afridi, T. Ali, T. Alghamdi, T. Ali, and M. Yasar, "Android application behavioral analysis through intent monitoring," in International Symposium on Digital Forensic and Security, ISDFS 2018, 2018, vol. 6, pp. 1-8.
- A. Feizollah, N. B. Anuar, R. Salleh, G. Suarez-Tangil, and S. Furnell, "AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection," Comput. Secur., vol. 65, no., pp. 121-134, 2017. https://doi.org/10.1016/j.cose.2016.11.007
- R. Chang et al., "Towards a multilayered permissionbased access control for extending Android security," Concurr. Comput., vol. 30, no. 5, 2018.
- L. Shi, J. Fu, Z. Guo, and J. Ming, "'Jekyll and hyde' is risky: Shared-everything threat mitigation in dual-instance apps*," in MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, 2019, pp. 225-235.
- S. Kumar, R. Shanker, and S. Verma, "Context aware dynamic permission model: A retrospect of privacy and security in android system," in Proceedings - 2nd International Conference on Intelligent Circuits and Systems, ICICS 2018, 2018, pp. 330-333.
- J. Xiao, S. Chen, Q. He, Z. Feng, and X. Xue, "An Android application risk evaluation framework based on minimum permission set identification," J. Syst. Softw., vol. 163, p. 110533, 2020. https://doi.org/10.1016/j.jss.2020.110533
- R. Kumar, X. Zhang, R. Khan, and A. Sharif, "Research on Data Mining of Permission-Induced Risk for Android IoT Devices," Appl. Sci., vol. 9, no. 2, p. 277, 2019. https://doi.org/10.3390/app9020277
- A. Bhattacharya and R. T. Goswami, "A Hybrid Community Based Rough Set Feature Selection Technique in Android Malware Detection," in Smart Trends in Systems, Security and Sustainability., 2018, no. 18, pp. 249-258.
- C. La, P. Myo, and K. M. Myo, "Permission-based Feature Selection for Android Malware Detection and Analysis," Int. J. Comput. Appl., vol. 181, no. 19, pp. 29-39, 2018. https://doi.org/10.5120/ijca2018917902
- M. Hammad, H. Bagheri, and S. Malek, "DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android," J. Syst. Softw., vol. 149, pp. 83-100, 2019. https://doi.org/10.1016/j.jss.2018.11.049
- W. Y. Lee, J. Saxe, and R. Harang, "SeqDroid: Obfuscated android malware detection using stacked convolutional and recurrent neural networks," Adv. Sci. Technol. Secur. Appl., pp. 197-210, 2019.
- M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, and T. Liu, "DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis," IEEE Trans. Inf. Forensics Secur., vol. 12, no. 8, pp. 1772-1785, 2017. https://doi.org/10.1109/TIFS.2017.2687880
- A. Sadeghi, R. Jabbarvand, N. Ghorbani, H. Bagheri, and S. Malek, "A temporal permission analysis and enforcement framework for Android," in Proceedings of the 40th International Conference on Software Engineering - ICSE '18, 2018, pp. 846-857.
- H. Shahriar and M. Islam, "Android Malware Detection Using Permission Analysis," IEEE Conf. Proc., vol. 2017, no. SoutheastCon, pp. 1-6, 2017.
- F. I. Abro, M. Rajarajana, and T. Chen, "Mobile Malware detection with permissions and intents analysis," p. 2014, 2014.
- M. Yusof, M. M. Saudi, and F. Ridzuan, "A new mobile botnet classification based on permission and API calls," in Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017, 2017, pp. 122-127.
- A. Talha and I. Alper, "An in-depth analysis of Android malware using hybrid techniques," Digit. Investig., vol. 24, pp. 25-33, 2018. https://doi.org/10.1016/j.diin.2018.01.001
- M. K. Alzaylaee, S. Y. Yerima, and S. Sezer, "Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation," in International Conference On Cyber Security And Protection Of Digital Services, 2017, pp. 1-8.
- C. Wang and Y. Lan, "PFESG : Permission-based Android Malware Feature Extraction Algorithm," in ICNCC 2017: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, 2017, pp. 106-109.
- J. Cai, J. Luo, S. Wang, and S. Yang, "Feature selection in machine learning: A new perspective," Neurocomputing, vol. 300, pp. 70-79, 2018. https://doi.org/10.1016/j.neucom.2017.11.077
- E. M. Karabulut, S. A. Ozel, and T. Ibrikci, "A comparative study on the effect of feature selection on classification accuracy," Procedia Technol., vol. 1, pp. 323-327, 2012. https://doi.org/10.1016/j.protcy.2012.02.068
- A. Sharma and S. Dey, "Performance Investigation of Feature Selection Methods and Sentiment Lexicons for Sentiment Analysis," Int. J. Comput. Appl., no. June, pp. 15-20, 2012.
- R. Kaur and M. Sachdeva, "Study and Comparison of Feature Selection Approaches for Intrusion Detection," in Proceedings on International Conference on Advances in Emerging Technology, 2016, vol. 2, pp. 1-7.
- X. Liu and J. Liu, "A two-layered permission-based android malware detection scheme," Proc. - 2nd IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud, pp. 142-148, 2014.