{"id":"https://openalex.org/W2087970742","doi":"https://doi.org/10.1109/tifs.2014.2353996","title":"Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection","display_name":"Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection","publication_year":2014,"publication_date":"2014-09-08","ids":{"openalex":"https://openalex.org/W2087970742","doi":"https://doi.org/10.1109/tifs.2014.2353996","mag":"2087970742"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2353996","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2353996","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109361586","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-9679-9480"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Wang","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","School of computer and information technology, Beijing Jiaotong University, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of computer and information technology, Beijing Jiaotong University, BeiJing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101728051","display_name":"Xing Wang","orcid":"https://orcid.org/0000-0003-3568-4994"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Wang","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","School of computer and information technology, Beijing Jiaotong University, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of computer and information technology, Beijing Jiaotong University, BeiJing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039795290","display_name":"Dawei Feng","orcid":"https://orcid.org/0000-0002-7587-8905"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawei Feng","raw_affiliation_strings":["National University of Defense Technology, Changsha, China","National University of Defense, Technology, ChangSha, China#TAB#"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"National University of Defense, Technology, ChangSha, China#TAB#","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070828650","display_name":"Jiqiang Liu","orcid":"https://orcid.org/0000-0003-1147-4327"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiqiang Liu","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","School of computer and information technology, Beijing Jiaotong University, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of computer and information technology, Beijing Jiaotong University, BeiJing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059369429","display_name":"Zhen Han","orcid":"https://orcid.org/0000-0002-3688-873X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Han","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","School of computer and information technology, Beijing Jiaotong University, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of computer and information technology, Beijing Jiaotong University, BeiJing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000755750","display_name":"Xiangliang Zhang","orcid":"https://orcid.org/0000-0002-3574-5665"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Xiangliang Zhang","raw_affiliation_strings":["Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia","Division of Computer, Electrical, and Mathematical Sciences and Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"Division of Computer, Electrical, and Mathematical Sciences and Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5109361586"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":15.0149,"has_fulltext":false,"cited_by_count":353,"citation_normalized_percentile":{"value":0.99372755,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"9","issue":"11","first_page":"1869","last_page":"1882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8797573447227478},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7537659406661987},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6757499575614929},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5864971876144409},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45757031440734863},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40939971804618835},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17619794607162476}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8797573447227478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7537659406661987},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6757499575614929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5864971876144409},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45757031440734863},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40939971804618835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17619794607162476},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2014.2353996","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2353996","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:repository.kaust.edu.sa:10754/556652","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/556652","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1704137926","display_name":null,"funder_award_id":"NCET-11-","funder_id":"https://openalex.org/F4320334924","funder_display_name":"Program for New Century Excellent Talents in University"},{"id":"https://openalex.org/G3358436227","display_name":null,"funder_award_id":"NCET-11-0565","funder_id":"https://openalex.org/F4320334924","funder_display_name":"Program for New Century Excellent Talents in University"},{"id":"https://openalex.org/G3661882638","display_name":null,"funder_award_id":"B14005","funder_id":"https://openalex.org/F4320327912","funder_display_name":"Higher Education Discipline Innovation Project"},{"id":"https://openalex.org/G4712144821","display_name":null,"funder_award_id":"20120009120010","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"},{"id":"https://openalex.org/G5540852255","display_name":null,"funder_award_id":"K14C300020","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"},{"id":"https://openalex.org/G7612288357","display_name":null,"funder_award_id":"111 Project","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321106","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934"},{"id":"https://openalex.org/F4320327912","display_name":"Higher Education Discipline Innovation Project","ror":null},{"id":"https://openalex.org/F4320334924","display_name":"Program for New Century Excellent Talents in University","ror":"https://ror.org/01mv9t934"},{"id":"https://openalex.org/F4320338204","display_name":"Program for Changjiang Scholars and Innovative Research Team in University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W81879861","https://openalex.org/W1865564993","https://openalex.org/W1912565424","https://openalex.org/W1943233084","https://openalex.org/W1963971515","https://openalex.org/W1985686072","https://openalex.org/W1986330503","https://openalex.org/W1988036170","https://openalex.org/W2002478203","https://openalex.org/W2003276999","https://openalex.org/W2017337590","https://openalex.org/W2033811191","https://openalex.org/W2041276426","https://openalex.org/W2058180826","https://openalex.org/W2091540464","https://openalex.org/W2104372627","https://openalex.org/W2114275288","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2139212933","https://openalex.org/W2140095007","https://openalex.org/W2149706766","https://openalex.org/W2156744053","https://openalex.org/W2158888459","https://openalex.org/W2164539435","https://openalex.org/W2187373861","https://openalex.org/W2398484989","https://openalex.org/W2399891510","https://openalex.org/W2911964244","https://openalex.org/W2998216295","https://openalex.org/W4236137412","https://openalex.org/W4285719527","https://openalex.org/W6603196380","https://openalex.org/W6603356336","https://openalex.org/W6639024520","https://openalex.org/W6640059210","https://openalex.org/W6640563219","https://openalex.org/W6641190993","https://openalex.org/W6646580381","https://openalex.org/W6686595536","https://openalex.org/W6712192629","https://openalex.org/W6712745783","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2717179875","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4249118297","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059"],"abstract_inverted_index":{"Android":[0,33,85,101,112,155],"has":[1],"been":[2],"a":[3,53,118,135,231,249,274],"major":[4],"target":[5],"of":[6,18,27,32,43,48,79,83,127,134,137,185,219,238],"malicious":[7],"applications":[8],"(malapps).":[9],"How":[10],"to":[11,45,56,62,69,74,98,153,160,175,294],"detect":[12],"and":[13,68,131,151,210,243,247,290],"keep":[14],"the":[15,19,28,41,57,65,70,77,92,108,125,132,183,207,212,217,281],"malapps":[16,246,296],"out":[17],"app":[20,58,90,235,251],"markets":[21],"is":[22,36],"an":[23,89,128],"ongoing":[24],"challenge.":[25],"One":[26],"central":[29],"design":[30],"points":[31],"security":[34],"mechanism":[35],"permission":[37,130,178,224,287],"control":[38],"that":[39,257],"restricts":[40],"access":[42,288],"apps":[44,113,242],"core":[46],"facilities":[47],"devices.":[49],"However,":[50],"it":[51],"imparts":[52],"significant":[54],"responsibility":[55],"developers":[59],"with":[60,72,158,191,273],"regard":[61,73],"accurately":[63],"specifying":[64],"requested":[66,87],"permissions":[67,86,157,187,264],"users":[71],"fully":[75],"understanding":[76,100],"risk":[78,110,126,133],"granting":[80],"certain":[81],"combinations":[82],"permissions.":[84,139],"by":[88],"depict":[91],"app's":[93],"behavioral":[94],"patterns.":[95],"In":[96],"order":[97],"help":[99],"permissions,":[102],"in":[103,111,117,204],"this":[104],"paper,":[105],"we":[106,122,181,203],"explore":[107],"permission-induced":[109],"on":[114,223,230,248,262,285],"three":[115,142],"levels":[116],"systematic":[119],"manner.":[120],"First,":[121],"thoroughly":[123],"analyze":[124,206],"individual":[129,156],"group":[136],"collaborative":[138],"We":[140,163,226],"employ":[141],"feature":[143],"ranking":[144],"methods,":[145],"namely,":[146],"mutual":[147],"information,":[148],"correlation":[149],"coefficient,":[150],"T-test":[152],"rank":[154],"respect":[159],"their":[161],"risk.":[162],"then":[164],"use":[165],"sequential":[166],"forward":[167],"selection":[168],"as":[169,171,197,199,214,216,271,278,299],"well":[170,198,215],"principal":[172],"component":[173],"analysis":[174],"identify":[176],"risky":[177,186,263],"subsets.":[179],"Second,":[180],"evaluate":[182,227],"usefulness":[184],"for":[188],"malapp":[189,220,259],"detection":[190,208,221,269],"support":[192],"vector":[193],"machine,":[194],"decision":[195],"trees,":[196],"random":[200],"forest.":[201],"Third,":[202],"depth":[205],"results":[209,255],"discuss":[211],"feasibility":[213],"limitations":[218],"based":[222],"requests.":[225],"our":[228,258],"methods":[229],"very":[232],"large":[233],"official":[234],"set":[236],"consisting":[237],"310":[239],"926":[240],"benign":[241],"4868":[244],"real-world":[245],"third-party":[250],"sets.":[252],"The":[253],"empirical":[254],"show":[256],"detectors":[260],"built":[261],"give":[265],"satisfied":[266],"performance":[267],"(a":[268],"rate":[270,277,298],"94.62%":[272],"false":[275],"positive":[276],"0.6%),":[279],"catch":[280],"malapps'":[282],"essential":[283],"patterns":[284],"violating":[286],"regulations,":[289],"are":[291],"universally":[292],"applicable":[293],"unknown":[295],"(detection":[297],"74.03%).":[300]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":33},{"year":2022,"cited_by_count":40},{"year":2021,"cited_by_count":45},{"year":2020,"cited_by_count":54},{"year":2019,"cited_by_count":44},{"year":2018,"cited_by_count":43},{"year":2017,"cited_by_count":22},{"year":2016,"cited_by_count":21},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
