13
A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 11998 ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com VULHUNTER-ANALYSIS OF VULNERABILITIES IN ANDROID APPLICATIONS A Mohamed Hisham*, J Alan Gnana Giftson, Mrs. D Kaavya Dept. of Information Technology, Faculty of Computing, Sathyabama University, Chennai, India. Email: [email protected] Received on 29-04-2016 Accepted on 28-05-2016 Abstract With the success of the Android application economy, numerous applications have been distributed and sold in different markets. Notwithstanding, short advancement cycles and inadequate security improvement rules have prompted numerous powerless applications. Albeit a few frameworks have been created for consequently finding particular vulnerabilities in applications, their adequacy and productivity are generally confined in view of the exponential development of ways to look at and disentangled suppositions. In this article, the writers propose another static- examination system for encouraging security investigators to identify powerless applications from three perspectives. To start with, they propose an application property diagram (APG), another information structure containing nitty gritty and exact data from applications. Second, by demonstrating application related vulnerabilities as diagram traversals, the creators conduct chart traversals over APGs to distinguish powerless applications for facilitating the ID process. Third, they lessen the workload of manual check by uprooting infeasible ways and producing assault inputs at whatever point conceivable. They have actualized the structure in a framework named VulHunter with thousands of lines of code and displayed five sorts of vulnerabilities. Checking 557 well known applications that are haphazardly gathered from Google Play and have no less than 1 million establishments, the creators found that 375 applications (67.3 percent) have no less than one helplessness. Key Words: Susceptibility in apps, Vulnerability Detection, I Introduction With the versatile Internet's prosperity, late years have seen a remarkable number of Android ("applications") conveyed and sold in application markets. Nevertheless, short change cycles and lacking security change rules have incited various

ISSN: 0975-766X CODEN: IJPTFI Available Online … · A Mohamed Hisham*et al. International Journal Of Pharmacy & Technology IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page

  • Upload
    vandiep

  • View
    235

  • Download
    0

Embed Size (px)

Citation preview

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 11998

ISSN: 0975-766X CODEN: IJPTFI

Available Online through Research Article

www.ijptonline.com VULHUNTER-ANALYSIS OF VULNERABILITIES IN ANDROID APPLICATIONS

A Mohamed Hisham*, J Alan Gnana Giftson, Mrs. D Kaavya

Dept. of Information Technology, Faculty of Computing, Sathyabama University, Chennai, India.

Email: [email protected]

Received on 29-04-2016 Accepted on 28-05-2016

Abstract

With the success of the Android application economy, numerous applications have been distributed and sold in different

markets. Notwithstanding, short advancement cycles and inadequate security improvement rules have prompted

numerous powerless applications. Albeit a few frameworks have been created for consequently finding particular

vulnerabilities in applications, their adequacy and productivity are generally confined in view of the exponential

development of ways to look at and disentangled suppositions. In this article, the writers propose another static-

examination system for encouraging security investigators to identify powerless applications from three perspectives. To

start with, they propose an application property diagram (APG), another information structure containing nitty gritty and

exact data from applications. Second, by demonstrating application related vulnerabilities as diagram traversals, the

creators conduct chart traversals over APGs to distinguish powerless applications for facilitating the ID process. Third,

they lessen the workload of manual check by uprooting infeasible ways and producing assault inputs at whatever point

conceivable. They have actualized the structure in a framework named VulHunter with thousands of lines of code and

displayed five sorts of vulnerabilities. Checking 557 well known applications that are haphazardly gathered from Google

Play and have no less than 1 million establishments, the creators found that 375 applications (67.3 percent) have no less

than one helplessness.

Key Words: Susceptibility in apps, Vulnerability Detection,

I Introduction

With the versatile Internet's prosperity, late years have seen a remarkable number of Android ("applications") conveyed

and sold in application markets. Nevertheless, short change cycles and lacking security change rules have incited various

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 11999

helpless applications. In the wake of examining 2,107 applications from associations on the Forbes Global 2000, HP

investigate starting late found that 90 percent of uses are frail murmured by late research, we propose another static-

examination framework to support removing so as to shortcoming exposure for applications organized and correct

information from applications, encouraging the recognizing evidence prepare, and reducing the manual-affirmation

workload. All the more definitively, we arrange a novel data structure called the application property graph (APG),

which effortlessly fuses hypothetical accentuation trees (ASTs), an interprocedure control-stream outline (ICFG), a

technique call diagram (MCG), and a system dependence outline (SDG) to identify with every application. Regardless

of the way that the APG is propelled by the code property graph (CPG),1 the APG changes from the CPG in light of the

paramount differentiation amidst applications and C source codes (see the "Related Work in Vulnerability Revelation"

sidebar for focuses of hobby). For delineation, the APG uses the ICFG, MCG, and SDG to depict the ceaseless

interprocedure and intercomponent trades in applications. The APG moreover joins approvals and other phenomenal

components in applications as properties. To encourage the unmistakable confirmation process, we indicate essential

vulnerabilities of utilizations reported in the Common Vulnerabilities besides, Exposures (CVE) system as outline

traversals and recognize frail applications by driving graph traversals over APGs. Note that every application ought to

be taken care of only once to separate APG and after that we can coordinate diverse outline traversals, including those

removed from new weakness plans. Furthermore, to diminish the manual-check workload, we use commonplace

execution to filter through infeasible ways and suggest attack inputs at whatever point possible. In making the APG, we

took care of various difficulties, consolidating overseeing object references and legacy in Shimple IR codes and dealing

with Android's event driven segment. Moreover, we propose an approach to manage change over Shimple IR codes to

SMT-Lib2 codes so that the current SMT solver can be used. Finally, we realized the structure in VulHunter with 9,145

lines of Java codes. We showed five standard vulnerabilities as graph traversals and checked the security of 577 surely

understood applications, each of which has more than 1 million foundations. The result creates the impression that 375

applications have no under one shortcoming. The security of PC systems basically relies on upon the way of its

concealed programming. Notwithstanding a long game plan of examination in the insightful world and industry, security

vulnerabilities as often as possible show in framework code, for occurrence as dissatisfactions to speak as far as possible

or as inadequate acknowledgment of data. Subsequently, vulnerabilities in programming stay one of the key drivers for

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12000

security breaks today. For case, A single bolster surge in a general fitting and play library rendered more than 23 million

changes powerless to ambushes from the Internet Similarly, an immense number of customers starting now succumb to

online malware that tries unmistakable defects in the environment The disclosure of programming vulnerabilities is a

gem yet testing issue of security. On account of the disappointment of a framework to perceive non-unimportant

properties of another venture, the flat issue of finding programming vulnerabilities is undecidable therefore, current

means for spotting security defects are either limited to specific sorts of vulnerabilities then again develop tedious and

manual examining. In particular, securing considerable programming exercises, for instance, a working system bit, takes

after a staggering errand, as a single flaw may undermine the security of the entire code base. Yet a couple classes of

vulnerabilities reoccurring all through the item scene exist for a long time, for instance, support surges furthermore,

course of action string vulnerabilities, normally recognizing their programming endeavors is every now and again still

not possible without colossal expert data As a delayed consequence of this situation, security research has at initially

focused on statically finding specific sorts of vulnerabilities, for instance, blemishes incited by insecure library limits

pad surges number surges or lacking acknowledgment of information data. In light of thoughts from programming

testing, a more broad disclosure of vulnerabilities has then been proficient .Utilizing dynamic undertaking examination,

going from clear cushion testing to front line dirty after and common execution. While these procedures can discover

assorted sorts of deformities, they are hard to work adequately in practice and much of the time disregard to give

appropriate results on account of either prohibitive runtime or the exponential advancement of execution approaches to

consider. As a cure, security research has starting late explored approaches that help an inspector in the midst of looking

at rather than supplanting her. The proposed procedures stimulate the expanding in order to analyze process static

framework examination with expert data and can thusly coordinate the search for vulnerabilities. In this paper, we

continue with this heading of investigation and present a novel technique for mining a great deal of source code for

vulnerabilities. Our approach solidifies commendable thoughts of framework examination with late headways in the

field of graph mining. The key learning central our philosophy is that various vulnerabilities must be acceptably found

by together considering the structure, control stream and states of code. We address this need by showing a novel

representation of source code demonstrated as code property graph. This graph joins properties of novel phonetic

structure trees, control stream outlines and program dependence diagrams in a joint data structure. This expansive

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12001

perspective on code enables us to impeccably show groups for typical vulnerabilities using diagram traversals. Like the

inquiry in a database, an outline traversal overlooks the code property graph in addition, analyzes the code structure, the

control stream, and the data conditions associated with each center point. This joint access to unmistakable code

properties enables making brief formats for a couple sorts of deformities and thusly surveys broad aggregates of code for

vulnerabilities. We realize our strategy using a pervasive graph database likewise, demonstrate its sensible benefits by

sketching out outline traversals for a couple comprehended defenselessness sorts, for instance, pad surges, entire number

surges, position string vulnerabilities, or memory revelations. As a show case, we separate the source, a gigantic and all

around surveyed code base. We find that all vulnerabilities reported for the Linux piece past times can be depicted using

traversals as a piece of its code property chart. Regardless of amazing tries by the open-source gathering to improve the

bit's security, these traversals enable us to discover previously darken vulnerabilities in the Linux part, in this way

demonstrating the limits of code property graphs for all intents and purposes speaking.

VulHunter first builds up an application's APG according to its procedure and a short time later stores it in a diagram

database, which uses outline structures (numbering center points, edges, and properties) to identify with and store data.

AndroidManifest.xml gives significant information around an application, for instance, required assents and reason

channels. We destroy classes.dex into Shimple IR code and a short time later form the AST, MCG, ICFG, and SDG.

These data structures shape an application's APG, connoted as f ¼ fN; R; Pg. N is the course of action of centers that

mean classes, methods, decrees, class fields, case fields, operands, besides. Different sorts of center points have various

imprints. R is the course of action of edges (or associations) that identify with relationship among classes, systems, and

clarifications, for instance, the data dependence and control dependence in the SDG, sentence structure relations in the

AST, and control stream in the CFG. P is the game plan of properties that identify with the attributions of center points

furthermore, associations. For example, the properties of a class center fuse technique signature, name, modifier, conflict

check, and whether it is a segment of certain part. The properties of dependence associations record the condition

("certified" or "false").

II Related Work

In this paper, we demonstrate a methodology to effectively mine a great deal of source code for vulnerabilities. To this

end, we exhibit a novel representation of source code called a code property outline that union’s thoughts of awesome

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12002

framework examination, to be particular hypothetical dialect structure trees, control stream graphs and program

dependence diagrams, into a joint data structure.

This broad representation engages us to impeccably exhibit designs for ordinary vulnerabilities with chart traversals that,

for instance, can recognize bolster surges, number surges, position string vulnerabilities, or memory disclosures. We

execute our approach using a standard graph database and demonstrate its sufficiency by perceiving 18 in advance dark

vulnerabilities in the source code of the Linux interface. Separating web applications requires pondering strings and non-

strings immovably. Existing string solvers either ignore non-string program director support obliged course of action of

string operations, Here we propose a generally helpful string solver, , as a development of the solver through its module

interface.

It views a string as a primitive sort, in this way avoiding the intrinsic hindrances found in various current solvers that

encode strings similarly as various primitives. The justification of the module has three sorts, to be particular, int and

string. The string-sorted terms join string constants and variables of optional length, with limits, for instance,

association, sub-string, and supplant. The sorted terms are standard, with the exception of the length limit over string

terms. The atomic formulas are scientific explanations over string terms and (in) values over entire number terms. Not

simply does our solver have highlights that engage whole framework average, static and component examination,

furthermore it performs better than anything diverse solvers in our investigations.

Late years have seen a splendid addition in the allocation of phones. To direct information and parts on such phones,

Android gives an assent based security demonstrate that requires each application to explicitly request approvals before

it can be acquainted with run. In this paper, we separate eight noticeable Android mobile phones and find that the stock

phone pictures don't suitably approve the approval model. A couple advantaged assents are perilously displayed to

various applications which don't need to request them for the genuine use. To perceive these spilled approvals or

capacities, we have added to a contraption called Woodpecker. Our results with eight phone pictures show that among

13 favored approvals broke down along these lines, 11 were spilled, with individual phones spilling up to eight assents.

Android has been a vital center of dangerous applications.

The best technique to perceive and keep the mal applications out of the application markets is an advancing test. One of

the central arrangement purposes of Android security part is approval control that limits the passageway of uses to focus

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12003

workplaces of contraptions. In any case, it gives an enormous commitment to the application engineers concerning

correctly deciding the requested approvals and to the customers as for totally understanding the risk of permitting certain

blends of assents. Android approvals requested by an application depict the application's behavioral samples. In order to

offer comprehension Android some assistance with consenting, in this paper, we research the approval actuated risk in

Android applications on three levels precise. To begin with, we totally separate the risk of an individual approval and the

peril of a social occasion of aggregate assents. We use three segment situating techniques, specifically, basic

information, relationship coefficient, and T-test to rank Android solitary approvals with respect to their risk. We then

use progressive forward decision and furthermore imperative part examination to perceive hazardous assent subsets.

Second, we evaluate the handiness of risky assents for malware app acknowledgment with support vector machine,

decision trees, and self-assertive woods. Third, we through and through separate the distinguishing proof occurs and

discuss the feasibility and what's more the requirements of malapp area in light of approval sales, Portable malware has

been creating in scale and many-sided nature instigated by the unabated uptake of PDAs around the globe.

Android is fast transforming into the most standard convenient stage realizing sharp addition in malware concentrating

on the stage. Moreover, Android malware is progressing rapidly to maintain a strategic distance from distinguishing

proof by customary imprint based analyzing. Notwithstanding present acknowledgment measures set up, favorable

disclosure of new malware is still an essential issue.

These calls for novel approaches to manage alleviate the creating risk of zero-day Android malware. Hence, the makers

make and analyze proactive machine-learning approaches in light of Bayesian portrayal went for uncovering dark

Android malware by method for static examination. The study, which relies on upon a far reaching malware test set of

lion's offer of the present families, shows recognizable proof limits with high precision. Accurate results and comparable

examination are shown offering accommodating information towards change of reasonable static-precise Bayesian

gathering based responses for recognizing dark Android malware.

III Overview of Existing System

Existing research on automatic vulnerability disclosure for applications for the most part spotlights on a few particular

sorts of vulnerabilities in light of the undesirability of the non specific issue of spotting project vulnerabilities. For

instance, ComDroid goes for Intent related issues (that is, unapproved Intent receipt and Intent caricaturing). SMV-

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12004

Hunter distinguishes SSL and Transport Layer Security man-in-the-center attacks..Content Scope looks at the

vulnerabilities of an unprotected substance supplier. Android Leaks reveals potential private data spillage. Woodpecker

targets ability spill vulnerabilities.

Static examination finds segment seizing vulnerabilities. Be that as it may, these frameworks' adequacy and productivity

are typically confined by and by because of the exponential development of ways to look at, rearranged suspicions, and

the set number of weakness patterns.1, 8 Moreover, it is difficult to extend these frameworks to catch new

vulnerabilities, in spite of the fact that they share some basic parts.

3.1 Limitations of existing framework

It is hard to extend these structures to get new vulnerabilities, regardless of the way that they share some typical,

parts.

They didn't discover powerless applications, and it is not clear how it shapes those applications.

IV Overview of Proposed System

We propose another static-examination structure to energize extricating so as to shortcoming revelation for applications

bare essential and careful information from applications and encouraging the conspicuous verification method.

Additionally, the framework can diminish the manual-check workload by performing slicing and filtering through

infeasible ways. To the extent anybody is concerned, existing approach’s can't finish these goals at the same time.

Furthermore, portraying application property graphs and using chart databases can scale up the frailty disclosure

process. Scientists are researching a choice frailty divulgence strategy of giving in order to energize security analyst’s

point by point and correct information and expert data.

The work closest to our philosophy is the code property graph which solidifies a one of a kind etymological structure

tree control stream outline and framework dependence chart to identify with source codes and model essential

vulnerabilities as graph traversals.

In this way, finding potential vulnerabilities is changed into performing outline traversals over with tremendously

enhanced execution to the extent precision and versatility. Despite the fact that we in like manner presentation

vulnerabilities as graph traversals and conduct chart traversals to find defenseless applications, vital complexities exist

between the two approach’s.

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12005

4.1 Advantages of Proposed System

Getting vulnerabilities is made basic moreover exhibiting vulnerabilities end up being straightforward as per graph

traversals.

It reduces false positives and enhances request according to vulnerabilities plan.

4.2 System Architecture:

4.3 Overview of System Architecture

We propose another static-examination structure to discover vulnerabilities divulgence for applications by removing

quick and dirty and correct information from applications, encouraging the unmistakable evidence handle, and

diminishing the manual-check workload. More accurately, we plot a novel data structure called the application property

outline which effortlessly fuses extraordinary language structure trees a cover strategy control stream graph which

crosses through the center points by the default way which encounters cutting engine where the entire application is

spread a minor piece at once and enrolled and sent with the mediator where it is adjusted to required association and it is

sent to confinement solver, it checks for the vulnerabilities present in the application and it is found in the output.

V Module Description

Modules:

Register

Log-in

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12006

Home

Memory

Performance Analysis

5.1 Register

Firstly we present the application using the apk to distinguish the amount of vulnerabilities present in the application and

after that to check if the application has any bugs present in it that might hurt your phone to slack or shutdown

pointlessly periodically, and after that after the foundation system is over it asks for that the customer register into the

application, Secondly we stick the association of the application for which the level of frailty should be checked is

incorporated. By then the customer needs to give his name, customer id, mystery key and adaptable number for the

record to get instituted.

5.2 Log-in

After the record is made, we sign into it, to perceive the measure of vulnerabilities present in the application and a while

later to check if the application has any bugs present in it that may hurt your PDA to slack or shutdown pointlessly

periodically, short progress cycles and lacking security change rules have affected different delicate applications

Although two or three structures have been made for along these lines finding particular vulnerabilities in applications,

their reasonableness and ampleness are ordinarily confined as a result of the exponential change of ways to deal with

separate and overhauled suspicions and a while later after the establishment method is over it requests that the client

register into the application, Secondly we stick the relationship of the application for which the level of deficiency ought

to be checked is fused.

5.3 Home

This is appeared to customers who have marked into the application using a generous id and a dynamic record, and the

required limits in it are memory supporter, battery data, scanner, and logout. These limits work when the customer needs

to check another application for its vulnerabilities in it. Memory supporter works when an overabundance of

establishment applications are running on your phone and conservatives the structure for its real reason, so it close all

the establishment applications and helps the memory for capable cpu usage with no slacking. Battery information is

appeared as to exhibit the customer the present battery level of the particular phone as while the customer begins the

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12007

checking of lack of protection in an application the battery usage may be more than standard times, so it educates the

customer to invigorate their phone to certain degree so the methodology may begin. The scanner highlight works when

the customer put's the association of the new application to check for it's lack of protection present in it, after the

customer incorporates the application interface the technique begins, and it continues till the weakness is found. Logout

highlight is direct as that, where the customer logs-out after the methodology is done

5.4 Memory

This component works when there's a considerable measure of use store present in the structure, i.e., when a particular

application is moved the system holds some memory for it to work upon, so when an overabundance of uses are

dispatched on the double and continues coming up short immediately, there's a ton of store in the structure which may

slack the cpu of it's done limit, so to beat that issue we've added this component to clear all application store present in

the system for the cpu to dashed to its most prominent without any bombshells. Another part is the launcher which

controls the customer interface of the phone to which it is being presented, there'll custom launchers open in the phone

for which the customer may pick upon one or use this launcher to change the look and feel of the interface.

5.5 Performance Analyses

This is the spot examinations of each and every limit happens, it screens whether the application meets the explanation

behind which it's being work for, basically checks the every part in the application with the objective that it needs to

work suitably. It minds the Register page whether the customer can enroll hi/her record shockingly else can sign if

he/she starting now has a record.

At the point when step one is done it proceeds to the accompanying step where the customer needs to adequately sign

into his record with the objective that he can work in the application , then it checks whether the customer has marked

into his dynamic record so he can utilize the compulsory limits present in the application, for example, memory

promoter, battery information, scanner, and logout.

Besides, it in like manner screen's the application hold memory in no time being used as a part of the system , since to

what degree has certain application been coming up short immediately and measure of store it has had and the total to be

cleared for perfect phone use will be appeared. So after each step being master as it's proposed for the customer finally

logs-out of the application after the technique is done.

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12008

Algorithm:

Breadth First Search

Breadth First Search Traversal (or Search) for a graph is similar to Breadth First Traversal of a tree, The only catch here

is, unlike trees, graphs may contain cycles, so we may come to the same node again. To avoid processing a node more

than once, we use a Boolean visited array. For simplicity, it is assumed that all vertices are reachable from the starting

vertex.

For example, in the following graph, we start traversal from vertex 2. When we come to vertex 0, we look for all

adjacent vertices of it. 2 is also an adjacent vertex of 0. If we don’t mark visited vertices, then 2 will be processed again

and it will become a non-terminating process. A Breadth First Traversal of the following graph is 2, 0, 3, and 1.

Conclusion:

We executed our static-examination framework in VulHunter and showed five sorts of vulnerabilities as outline

traversals. Checking 557 surely understood applications, we found that 375 (67.3 percent) of uses had at scarcest one

shortcoming. Our future work is twofold. One point is to propel upgrade the structure, for instance, including dead-code

recognizable proof to diminish false positives, proposing formal approaches to manage display new vulnerabilities using

APGs, and enhancing questions consenting to powerlessness plans. The other point is to fuse it with component

examination for affirming suspicious applications normally.

Hunting viruses

Improved battery Memory

Vulhunter

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12009

Table: 1

Improved battery 54%

Vulhunter 33%

Memory boost 13%

Table: 2

Memory boost 55%

Improved battery 28%

Vulhunter 17%

Improved battery 35%

Vulhunter 40%

Memory boost 25%

References:

1. F. Yamaguchi, "Modelling and Discovering Vulnerabilities with Code Property Graphs”, Proc. IEEE Symp. Security

and Privacy, pp.590 -604, 2014.

Memory Boost

Memory

Vulhunter

Memory

Vulhunter Improved battery size

Vulhunter

Vulhunter

Memory

Vulhunter Improved battery size

A Mohamed Hisham* et al. International Journal Of Pharmacy & Technology

IJPT| June-2016 | Vol. 8 | Issue No.2 | 11998-12010 Page 12010

2. Y. Zheng, X. Zhang and V. Ganesh, "Z3-str: A z3-Based String Solver for Web Application Analysis" , Proc. 9th

Joint Meeting Foundations of Software Eng. , pp.114 -124 , 2013.

3. M. Grace, "Systematic Detection of Capability Leaks in Stock Android Smartphones" , Proc. Network and

Distributed System Security Symp. , 2012.

4. D. Sounthiraraj, "SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in

Android Apps”, Proc. Network and Distributed System Security Symp. , 2014.

5. Xing Wang Dawei Feng Jiqiang Liu Zhen Han ; Xiang liang Zhang “Exploring Permission-Induced Risk in Android

Applications for Malicious Application Detection” Proc. Network and Distributed System Security Symp 2014.

6. Sbirlea,D. Department of Computer Science, Rice University, Houston, TX, USA Burke, M.G. ; Guarnieri,

S. ; Pistoia, M. ; Sarkar, V. “Automatic detection of inter-application permission leaks in Android applications”

2013.

7. Yerima, S.Y. ; Centre for Secure Inf. Technol. (CSIT), Queen's Univ., Belfast, UK ; Sezer, S. ; McWilliams, G.

“Analysis of Bayesian classification-based approaches for Android malware detection” Information Security, IET

2014.

8. Yerima, S.Y. ; Centre for Secure Inf. Technol. (CSIT), Queen's Univ., Belfast, UK ; Sezer, S. ; Muttik, I. “Android

Malware Detection Using Parallel Machine Learning Classifiers” Next Generation Mobile Apps, Services and

Technologies (NGMAST), 2014 Eighth International Conference on 2014.

9. Yerima, S.Y. ; Centre for Secure Inf. Technol. (CSIT), Queen's Univ. Belfast, Belfast, UK ; Sezer, S. ; Muttik, I.

“Android malware detection: An eigen space analysis approach” Published in Science and Information Conference

(SAI), 2015.

10. B. Sarma, C. Gates, N. Li, R. Potharaju, C. Nita-Rotaru and I. Molloy, Android permissions: a perspective

combining risks and benefits, ACM SACMAT 2012, June 2012.

Corresponding Author:

A Mohamed Hisham*,

Email: [email protected]