No Cover Image

Journal article 484 views 38 downloads

Towards a threat assessment framework for apps collusion

Harsha Kumara Kalutarage Orcid Logo, Hoang Nguyen Orcid Logo, Siraj Shaikh Orcid Logo

Telecommunication Systems, Volume: 66, Issue: 3, Pages: 417 - 430

Swansea University Authors: Hoang Nguyen Orcid Logo, Siraj Shaikh Orcid Logo

  • 61043_VoR.pdf

    PDF | Version of Record

    © The Author(s) 2017. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License

    Download (1.09MB)

Abstract

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited to mitigating risks of individual apps. This paper...

Full description

Published in: Telecommunication Systems
ISSN: 1018-4864 1572-9451
Published: Springer Science and Business Media LLC 2017
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61043
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-10-14T15:13:47Z
last_indexed 2023-01-13T19:21:36Z
id cronfa61043
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-12-15T16:07:50.8532118</datestamp><bib-version>v2</bib-version><id>61043</id><entry>2022-09-05</entry><title>Towards a threat assessment framework for apps collusion</title><swanseaauthors><author><sid>cb24d5c5080534dc5b5e3390f24dd422</sid><ORCID>0000-0003-0260-1697</ORCID><firstname>Hoang</firstname><surname>Nguyen</surname><name>Hoang Nguyen</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>SCS</deptcode><abstract>App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited to mitigating risks of individual apps. This paper presents a technique for quantifying the collusion threat, essentially the first step towards assessing the collusion risk. The proposed method is useful in finding the collusion candidate of interest which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29,000 Android apps provided by Intel SecurityTM.</abstract><type>Journal Article</type><journal>Telecommunication Systems</journal><volume>66</volume><journalNumber>3</journalNumber><paginationStart>417</paginationStart><paginationEnd>430</paginationEnd><publisher>Springer Science and Business Media LLC</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1018-4864</issnPrint><issnElectronic>1572-9451</issnElectronic><keywords>Android security; Apps collusion; Threat assessment; Bayesian; Statistical modelling</keywords><publishedDay>1</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2017</publishedYear><publishedDate>2017-11-01</publishedDate><doi>10.1007/s11235-017-0296-1</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders>This work is as a result of the App Collusion Detection (ACiD) (http://cs.swan.ac.uk/~csmarkus/ACID/) project funded by the Engineering and Physical Sciences Research Council (EPSRC) of the UK under the grant EP/L022656/1 (http://gow.epsrc.ac.uk/NGBOViewGrant.aspx?GrantRef=EP/L022656/1).</funders><projectreference/><lastEdited>2022-12-15T16:07:50.8532118</lastEdited><Created>2022-09-05T22:38:12.4967336</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Harsha Kumara</firstname><surname>Kalutarage</surname><orcid>0000-0001-6430-9558</orcid><order>1</order></author><author><firstname>Hoang</firstname><surname>Nguyen</surname><orcid>0000-0003-0260-1697</orcid><order>2</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>3</order></author></authors><documents><document><filename>61043__25458__66862b924d45499192e782a8d2fb1aed.pdf</filename><originalFilename>61043_VoR.pdf</originalFilename><uploaded>2022-10-14T16:11:27.2334575</uploaded><type>Output</type><contentLength>1143684</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>&#xA9; The Author(s) 2017. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by/4.0</licence></document></documents><OutputDurs/></rfc1807>
spelling 2022-12-15T16:07:50.8532118 v2 61043 2022-09-05 Towards a threat assessment framework for apps collusion cb24d5c5080534dc5b5e3390f24dd422 0000-0003-0260-1697 Hoang Nguyen Hoang Nguyen true false 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 SCS App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited to mitigating risks of individual apps. This paper presents a technique for quantifying the collusion threat, essentially the first step towards assessing the collusion risk. The proposed method is useful in finding the collusion candidate of interest which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29,000 Android apps provided by Intel SecurityTM. Journal Article Telecommunication Systems 66 3 417 430 Springer Science and Business Media LLC 1018-4864 1572-9451 Android security; Apps collusion; Threat assessment; Bayesian; Statistical modelling 1 11 2017 2017-11-01 10.1007/s11235-017-0296-1 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University This work is as a result of the App Collusion Detection (ACiD) (http://cs.swan.ac.uk/~csmarkus/ACID/) project funded by the Engineering and Physical Sciences Research Council (EPSRC) of the UK under the grant EP/L022656/1 (http://gow.epsrc.ac.uk/NGBOViewGrant.aspx?GrantRef=EP/L022656/1). 2022-12-15T16:07:50.8532118 2022-09-05T22:38:12.4967336 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Harsha Kumara Kalutarage 0000-0001-6430-9558 1 Hoang Nguyen 0000-0003-0260-1697 2 Siraj Shaikh 0000-0002-0726-3319 3 61043__25458__66862b924d45499192e782a8d2fb1aed.pdf 61043_VoR.pdf 2022-10-14T16:11:27.2334575 Output 1143684 application/pdf Version of Record true © The Author(s) 2017. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License true eng http://creativecommons.org/licenses/by/4.0
title Towards a threat assessment framework for apps collusion
spellingShingle Towards a threat assessment framework for apps collusion
Hoang Nguyen
Siraj Shaikh
title_short Towards a threat assessment framework for apps collusion
title_full Towards a threat assessment framework for apps collusion
title_fullStr Towards a threat assessment framework for apps collusion
title_full_unstemmed Towards a threat assessment framework for apps collusion
title_sort Towards a threat assessment framework for apps collusion
author_id_str_mv cb24d5c5080534dc5b5e3390f24dd422
50117e8faac2d0937989e14847105704
author_id_fullname_str_mv cb24d5c5080534dc5b5e3390f24dd422_***_Hoang Nguyen
50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Hoang Nguyen
Siraj Shaikh
author2 Harsha Kumara Kalutarage
Hoang Nguyen
Siraj Shaikh
format Journal article
container_title Telecommunication Systems
container_volume 66
container_issue 3
container_start_page 417
publishDate 2017
institution Swansea University
issn 1018-4864
1572-9451
doi_str_mv 10.1007/s11235-017-0296-1
publisher Springer Science and Business Media LLC
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited to mitigating risks of individual apps. This paper presents a technique for quantifying the collusion threat, essentially the first step towards assessing the collusion risk. The proposed method is useful in finding the collusion candidate of interest which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29,000 Android apps provided by Intel SecurityTM.
published_date 2017-11-01T04:19:38Z
_version_ 1763754302242816000
score 11.013731