The paper presents a methodology for mobile forensics analysis, to detect \malicious " (or \malware") applications, i.e., those that deceive users hiding some of their functionalities. This methodology is speci-cally targeted for the Android mobile operating system, and relies on its security model features, namely the set of permissions exposed by each application. The methodology has been trained on more than 13,000 ap-plications hosted on the Android Market, collected with AppAware. A case study is presented as a preliminary validation of the methodology.
Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.