Discovering inconsistencies between requested permissions and application metadata by using deep learning
dc.contributor.author | Alecakir, Huseyin | |
dc.contributor.author | Kabukcu, Muhammet | |
dc.contributor.author | Can Buglalilar, Burcu | |
dc.contributor.author | Şen, Sevil | |
dc.date.accessioned | 2020-12-18T09:32:26Z | |
dc.date.available | 2020-12-18T09:32:26Z | |
dc.date.issued | 2020-12-31 | |
dc.identifier.citation | Alecakir, H., Kabukcu, M., Can, B. and Sen, S. (2020) Discovering inconsistencies between requested permissions and application metadata by using deep learning, 2020 International Conference on Information Security and Cryptology (ISCTURKEY), DOI 10.1109/ISCTURKEY51113.2020.9308004 | en |
dc.identifier.doi | 10.1109/ISCTURKEY51113.2020.9308004 | |
dc.identifier.uri | http://hdl.handle.net/2436/623841 | |
dc.description | This is an accepted manuscript of an article published by IEEE in 2020 International Conference on Information Security and Cryptology (ISCTURKEY), available online at https://ieeexplore.ieee.org/document/9308004 The accepted version of the publication may differ from the final published version. | en |
dc.description.abstract | Android gives us opportunity to extract meaningful information from metadata. From the security point of view, the missing important information in metadata of an application could be a sign of suspicious application, which could be directed for extensive analysis. Especially the usage of dangerous permissions is expected to be explained in app descriptions. The permission-to-description fidelity problem in the literature aims to discover such inconsistencies between the usage of permissions and descriptions. This study proposes a new method based on natural language processing and recurrent neural networks. The effect of user reviews on finding such inconsistencies is also investigated in addition to application descriptions. The experimental results show that high precision is obtained by the proposed solution, and the proposed method could be used for triage of Android applications. | en |
dc.format | application/pdf | en |
dc.language.iso | en | en |
dc.publisher | ISCTurkey | en |
dc.relation.url | https://ieeexplore.ieee.org/document/9308004 | en |
dc.subject | security | en |
dc.subject | deep learning | en |
dc.title | Discovering inconsistencies between requested permissions and application metadata by using deep learning | en |
dc.type | Conference contribution | en |
dc.date.updated | 2020-12-15T19:33:59Z | |
dc.conference.name | The 13th International Conference on Information Security and Cryptology | |
dc.conference.location | Virtual | |
pubs.finish-date | 2020-12-04 | |
pubs.start-date | 2020-12-03 | |
dc.date.accepted | 2020-11-25 | |
rioxxterms.funder | University of Wolverhampton | en |
rioxxterms.version | AM | en |
rioxxterms.licenseref.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | en |
rioxxterms.licenseref.startdate | 2020-12-31 | en |
refterms.dateFCD | 2020-12-18T09:29:38Z | |
refterms.versionFCD | AM | |
refterms.dateFOA | 2020-12-31T00:00:00Z |