Please use this identifier to cite or link to this item: http://hdl.handle.net/1893/37041
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlecakir, Huseyinen_UK
dc.contributor.authorCan, Burcuen_UK
dc.contributor.authorSen, Sevilen_UK
dc.contributor.otherCan Buglalilar, Burcuen_UK
dc.date.accessioned2025-05-02T00:34:42Z-
dc.date.available2025-05-02T00:34:42Z-
dc.date.issued2020-12-31en_UK
dc.identifier.urihttp://hdl.handle.net/1893/37041-
dc.description.abstractSince mobile applications make our lives easier, there is a large number of mobile applications customized for our needs in the application markets. While the application markets provide us a platform for downloading applications, it is also used by malware developers in order to distribute their malicious applications. In Android, permissions are used to prevent users from installing applications that might violate the users’ privacy by raising their awareness. From the privacy and security point of view, if the functionality of applications is given in sufficient detail in their descriptions, then the requirement of requested permissions could be well-understood. This is defined as description-to-permission fidelity in the literature. In this study, we propose two novel models that address the inconsistencies between the application descriptions and the requested permissions. The proposed models are based on the current state-of-art neural architectures called attention mechanisms. Here, we aim to find the permission statement words or sentences in app descriptions by using the attention mechanism along with recurrent neural networks. The lack of such permission statements in application descriptions creates a suspicion. Hence, the proposed approach could assist in static analysis techniques in order to find suspicious apps and to prioritize apps for more resource intensive analysis techniques. The experimental results show that the proposed approach achieves high accuracy.en_UK
dc.language.isoenen_UK
dc.publisherSpringer Science and Business Media LLCen_UK
dc.relationAlecakir H, Can B & Sen S (2020) Attention: there is an inconsistency between android permissions and application metadata!. Can Buglalilar B (Research Group) <i>International Journal of Information Security</i>, 20 (6), pp. 797-815. https://doi.org/10.1007/s10207-020-00536-1en_UK
dc.rightsCopyright © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature.en_UK
dc.rights.urihttps://storre.stir.ac.uk/STORREEndUserLicence.pdfen_UK
dc.titleAttention: there is an inconsistency between android permissions and application metadata!en_UK
dc.typeJournal Articleen_UK
dc.identifier.doi10.1007/s10207-020-00536-1en_UK
dc.citation.jtitleInternational Journal of Information Securityen_UK
dc.citation.issn2382-2619en_UK
dc.citation.issn2356-5845en_UK
dc.citation.volume20en_UK
dc.citation.issue6en_UK
dc.citation.spage797en_UK
dc.citation.epage815en_UK
dc.citation.publicationstatusPublisheden_UK
dc.citation.peerreviewedRefereeden_UK
dc.type.statusAM - Accepted Manuscripten_UK
dc.author.emailburcu.can@stir.ac.uken_UK
dc.citation.date07/01/2021en_UK
dc.contributor.affiliationComputing Scienceen_UK
dc.identifier.isiWOS:000605931200001en_UK
dc.identifier.scopusid2-s2.0-85099105158en_UK
dc.identifier.wtid2075240en_UK
dc.contributor.orcid0000-0003-2278-1453en_UK
dc.date.accepted2020-12-15en_UK
dcterms.dateAccepted2020-12-15en_UK
dc.date.filedepositdate2024-11-27en_UK
rioxxterms.versionAMen_UK
local.rioxx.authorAlecakir, Huseyin|0000-0003-2278-1453en_UK
local.rioxx.authorCan, Burcu|en_UK
local.rioxx.authorSen, Sevil|en_UK
local.rioxx.projectInternal Project|University of Stirling|https://isni.org/isni/0000000122484331en_UK
local.rioxx.freetoreaddate2025-04-29en_UK
local.rioxx.licencehttp://www.rioxx.net/licenses/under-embargo-all-rights-reserved||2021-12-31en_UK
local.rioxx.licencehttps://storre.stir.ac.uk/STORREEndUserLicence.pdf|2025-04-29|en_UK
local.rioxx.filenameMakale.pdfen_UK
local.rioxx.filecount1en_UK
local.rioxx.source2382-2619en_UK
Appears in Collections:Computing Science and Mathematics Journal Articles

Files in This Item:
File Description SizeFormat 
Makale.pdfFulltext - Accepted Version1.07 MBAdobe PDFView/Open


This item is protected by original copyright



Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/

If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.