@inbook{88940d6052494381a5661304ab36abf3,
title = "Performance Evaluation on Permission-Based Detection for Android Malware",
abstract = "It is a straightforward idea to detect a harmful mobile application based on the permissions it requests. This study attempts to explore the possibility of detecting malicious applications in Android operating system based on permissions. Compare against previous researches, we collect a relative large number of benign and malicious applications (124,769 and 480, respectively) and conduct experiments based on the collected samples. In addition to the requested and the required permissions, we also extract several easy-to-retrieve features from application packages to help the detection of malicious applications. Four commonly used machine learning algorithms including AdaBoost, Na{\"i}ve Bayes, Decision Tree (C4.5), and Support Vector Machine are used to evaluate the performance. Experimental results show that a permission-based detector can detect more than 81% of malicious samples. However, due to its precision, we conclude that a permission-based mechanism can be used as a quick filter to identify malicious applications. It still requires a second pass to make complete analysis to a reported malicious application.",
keywords = "Android, Classification, Malware, Mobile Security, Permission",
author = "Chun-Ying Huang and Tsai, {Yi Ting} and Hsu, {C. H.}",
year = "2013",
doi = "10.1007/978-3-642-35473-1_12",
language = "English",
isbn = "9783642354724",
series = "Smart Innovation, Systems and Technologies",
pages = "111--120",
editor = "Chang Ruay-Shiung and Peng Sheng-Lung and Lin Chia-Chen",
booktitle = "Advances in Intelligent Systems and Applications - Volume 2",
}