Mining Anomalous Usage of Sensitive Data through Anomaly Detection

Xin Jin,Yan Xiong,Wenchao Huang,Zhaoyi Meng
DOI: https://doi.org/10.1109/BIGCOM.2017.44
2017-01-01
Abstract:Android smartphones have been playing an important role in people's daily life. Unfortunately, the widespread of Android devices raises high security concerns. The sensitive information of users, such as contact list, SMS, location information, may be stolen by various malware. State-of-the-art approaches can detect most of the malware based on known rules or patterns but remain unprotected from novel privacy leaking behaviors. Our observation is that in same category most of applications contain same or similar sensitive data usage behaviors, so the abnormal data usage behaviors can be judged as malicious cases with high probability. Based on this observation, we propose and implement a system to identify malicious sensitive data usage behaviors and novel malware. We give a detailed analysis about abnormal data usage behavoirs, and our experiment results show our approach can identify 92.7% of all malicious data usage behaviors.
What problem does this paper attempt to address?