• Title/Summary/Keyword: Permissions

Search Result 93, Processing Time 0.018 seconds

Intelligent Approach for Android Malware Detection

  • Abdulla, Shubair;Altaher, Altyeb
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2964-2983
    • /
    • 2015
  • As the Android operating system has become a key target for malware authors, Android protection has become a thriving research area. Beside the proved importance of system permissions for malware analysis, there is a lot of overlapping in permissions between malware apps and goodware apps. The exploitation of them effectively in malware detection is still an open issue. In this paper, to investigate the feasibility of neuro-fuzzy techniques to Android protection based on system permissions, we introduce a self-adaptive neuro-fuzzy inference system to classify the Android apps into malware and goodware. According to the framework introduced, the most significant permissions that characterize optimally malware apps are identified using Information Gain Ratio method and encapsulated into patterns of features. The patterns of features data is used to train and test the system using stratified cross-validation methodologies. The experiments conducted conclude that the proposed classifier can be effective in Android protection. The results also underline that the neuro-fuzzy techniques are feasible to employ in the field.

Study on Reform of Development Regulations in Greenbelt - Focused on Agricultural, Forestry and Fisheries Facilities - (그린벨트내 개발행위허가 규제제도의 변천에 관한 연구 - 농림수산업용 시설을 중심으로 -)

  • Lee, Sang-Won;Sato, Yohei
    • Journal of Korean Society of Rural Planning
    • /
    • v.6 no.1 s.11
    • /
    • pp.10-18
    • /
    • 2000
  • The objective of this study is to analyze 1) the law system in relation with the development permissions 2) characteristics of the development permissions change 3) especially focusing on the development permissions changes in agricultural, forestry and fisheries facilities in light of socio - economic conditions in Korea Greenbelt. The following results were obtained: 1) The purpose of Greenbelt in Korea is to control the land use in order to protect the surrounding areas from urbanization. 2) During the 1990s, the number of formulated development regulations increased one and half times than that of the previous decades(1970s 1980s). The main reasons are advancements of local autonomy and democratization. 3) Three patterns were observed with respect to ease the regulations in agricultural, forestry and fisheries facilities those are: (1) increase in types of businesses ; (2) increase the maximum area permitted ; (3) decrease in qualification for establishing facilities. 4) There were few development permissions in a agricultural, forestry and fisheries facilities in consideration to the regional agricultural condition. The development permissions were only during the period of restricted to use ($1979.12{\sim}1993.11$). We propose that the authority of development permission should be given to the local autonomy government, because the local government has the knowledge of its individual agricultural conditions.

  • PDF

Symmetric RBAC Model that Takes the Separation of Duties and Role Hierarchies into Consideration (임무분리와 역할 계층구조를 고려한 대칭 RBAC 모델)

  • 문창주;박대하;박성진;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.699-707
    • /
    • 2003
  • RBAC is accepted as a more advanced control method than existing DAC and MAC. Studies on the permission-role part of RBAC model are relatively insufficient compared with those on the user-role part, and researches on symmetric RBAC models to overcome this is also in an incipient stage. Therefore there is much difficulty in assigning permissions suitable for roles. This paper proposes an symmetric RBAC model that supplements the constraints on permission assignment set forth by previous studies. The proposed symmetric RBAC model reflects the conflicts of interests between roles and the sharing and integration of permissions on the assignment of permissions by presenting the constraints on permission assignment that take the separation of duties and role hierarchies into consideration. In addition, by expressing constraints prescribing prerequisite relations between dynamic permissions through AND/OR graphs, it is possible to effectively limit the complicated prerequisite relations of permissions. The constraints on permission assignment for the proposed symmetric RBAC model reduce errors in permission assignment by properly detailing rules to observe at the time of permission assignment.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.

The Detection of Android Malicious Apps Using Categories and Permissions (카테고리와 권한을 이용한 안드로이드 악성 앱 탐지)

  • Park, Jong-Chan;Baik, Namkyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.907-913
    • /
    • 2022
  • Approximately 70% of smartphone users around the world use Android operating system-based smartphones, and malicious apps targeting these Android platforms are constantly increasing. Google has provided "Google Play Protect" to respond to the increasing number of Android targeted malware, preventing malicious apps from being installed on smartphones, but many malicious apps are still normal. It threatens the smartphones of ordinary users registered in the Google Play store by disguising themselves as apps. However, most people rely on antivirus programs to detect malicious apps because the average user needs a great deal of expertise to check for malicious apps. Therefore, in this paper, we propose a method to classify unnecessary malicious permissions of apps by using only the categories and permissions that can be easily confirmed by the app, and to easily detect malicious apps through the classified permissions. The proposed method is compared and analyzed from the viewpoint of undiscovered rate and false positives with the "commercial malicious application detection program", and the performance level is presented.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Study on The RBAC Protocol of Medical Information System (의료정보시스템의 RBAC 프로토콜 연구)

  • Lim, Kyeong Suk;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.77-84
    • /
    • 2016
  • In general RBAC(Role-Based-Access Control) model, senior role has junior role's permissions by virtue of role hierarchy. But although the opposite case is needed partially in medical institutions, such case cannot be performed in medical information systems. This is because inheritances of permissions in role hierarchies are static. In order to tackle this problem, this paper defined a dynamic role assignment, thereby proposed the way for the junior temporarily to be able to perform the permissions of the senior, and showed the applications of medical information systems.

Permissions based Automatic Android Malware Repair using Long Short Term Memory (롱 숏 텀 메모리를 활용한 권한 기반 안드로이드 말웨어 자동 복구)

  • Wu, Zhiqiang;Chen, Xin;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.387-388
    • /
    • 2019
  • As malicious apps vary significantly across Android malware, it is challenging to prevent that the end-users download apps from unsecured app markets. In this paper, we propose an approach to classify the malicious methods based on permissions using Long Short Term Memory (LSTM) that is used to embed the semantics among Intent and permissions. Then the malicious method that is an unsecured method will be removed and re-uploaded to official market. This approach may induce that the end-users download apps from official market in order to reduce the risk of attacks.

  • PDF

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Testing Android Applications Considering Various Contexts Inferred from Permissions (안드로이드 어플리케이션 개발에서 퍼미션 분석을 사용한 다양한 테스트 환경 조건 생성 기법)

  • Song, Kwangsik;Han, Ah-Rim;Jeong, Sehun;Cha, Sungdeok
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1022-1030
    • /
    • 2015
  • The context-awareness of mobile applications yields several issues for testing, since mobile applications should be able to be tested in any environment and under any contextual input. In previous studies of testing for Android applications as an event-driven system, many researchers have focused on using generated test cases considering only Graphical User Interface (GUI) events. However, it is difficult to find failures that could be detected when considering the changes in the context in which applications run. It is even more important to consider various contexts since the mobile applications adapt and use the new features and sensors of mobile devices. In this paper, we provide a method of systematically generating various executing contexts from permissions. By referring to the lists of permissions, the resources used by the applications for running Android applications can be easily inferred. To evaluate the efficiency of our testing method, we applied the method on two open source projects and showed that it contributes to improve the statement code coverage.