Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review
Abstract
:1. Introduction
2. Background
2.1. Malware and Android Apps
2.2. Machine Learning
2.3. Types of Malware
3. Related Work
4. Research Methodology
4.1. Review Protocol
- ACM
- Google Scholar
- IEEE Xplore
- Science Direct
- Scopus
- Web of Science
- Wiley
4.2. Research Questions
- RQ1: What challenges face the permission analysis technique in detecting Android malware?
- RQ2: What possible methods or approaches can be used to mitigate those challenges?
- RQ3: How effective is this approach in the context of new and customized versions of Android?
- RQ4: Out of the studied solutions, which one provides the best result?
- RQ5: Which datasets are used in the primary studies?
4.3. Search Strategy
4.4. Prisma Flow Diagram
4.5. Exclusion Criteria
- Publications that are not directly related to permission analysis techniques regarding malware detection
- Publications in a language other than English
- Publications that are duplicates
- Publications that have their abstract available only and the full text is not available
- Secondary studies or review papers
- Publication year earlier than 2011
4.6. Quality Score
- 1 (if the answer is yes)
- 0 (if the answer is no)
- 0.5 (if the answer is somewhat)
- Does the study state the aims clearly?
- Has the scope of the study been clearly defined?
- Are the variables used in the study reliable?
- Is the process of research sufficiently covered by the documentation of the study?
- Has the study effectively answered the questions defined?
- Does the study result in obstructive findings?
- Does the study list major outcomes related to reliability and soundness?
- Does the conclusion coincide with the aims of the study?
4.7. Data Synthesis
5. Results
- The start-to-end mechanism applied by each study for malware detection
- Analysis technique used
- Machine learning classifier (used or developed if any)
- Additional tools used for the process of analysis or evaluation
5.1. RQ1—What Challenges Permission Analysis Technique Faces to Detect Android Malware?
- (a)
- Preserving user’s privacy during malware detection is a major challenge, no matter what technique is followed. Malware detection with the help of analyzing permissions can be executed in two ways: first, on the device where no information is shared externally, and second, where necessary information is gathered from the device and sent to an external (usually cloud-hosted) service for analysis. Since the device is limited in resources, cloud-based service can be helpful. However, in both cases, there is a privacy concern. In the first case, the malware analysis itself needs elevated privileges so that it can read and decompile .apk files for the sake of permission extraction and further analysis. In the second case, extracting information from the device and sending it to an external service clearly adds more weight to the privacy concern.
- (b)
- Since malware and clean apps might have similar permissions, it is highly likely to end up with FP (false positives) and/or FN (false negatives), where an app is either wrongly classified as malware or wrongly classified as a clean app. This presents yet another challenge to generating an efficient approach to minimizing FP and FN. Malware developers add permissions in the manifest file that are similar to a clean app. This raises the likelihood of fooling the detection process and yielding the wrong result.
- (c)
- Modern malware is developed using state-of-the-art obfuscation technologies, which help them to be even stealthier. This makes it challenging for the detection methodologies to work successfully. In some works in the literature, methodologies are introduced where a hybrid approach is used. In such cases, permissions are evaluated in more depth by analyzing the app behavior as well. However, the malware uses obfuscation to hide various aspects of behavior, such as encrypted external communication. Due to this, dynamic analysis cannot effectively analyze the behavior of the app in the context of declared permissions.
5.2. RQ2—What Possible Methods or Approaches Can Be Used to Mitigate Those Challenges?
5.3. RQ3—How Effective Is This Approach in the Context of New and Customized Versions of ANDROID?
5.4. RQ4—Out of the Studied Solutions, Which One Provides the Best Results?
5.5. RQ5—Which Datasets Were Used in the Primary Studies?
6. Discussion and Threats to Validity
6.1. General Discussion
6.2. Threats to Validity
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Statista: Number of Smartphone Users Worldwide from 2016 to 2021. 2021. Available online: https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide (accessed on 14 June 2022).
- Statista, Mobile Operating Systems’ Market Share Worldwide from January 2012 to June 2021. 2021. Available online: https://www.statista.com/statistics/272698/global-marketshare-held-by-mobile-operating-systems-since-2009 (accessed on 14 June 2022).
- Faruki, P.; Bharmal, A.; Laxmi, V.; Ganmoor, V.; Gaur, M.S.; Conti, M.; Rajarajan, M. Android security: A survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 2014, 17, 998–1022. [Google Scholar] [CrossRef] [Green Version]
- Yan, P.; Yan, Z. A survey on dynamic mobile malware detection. Softw. Qual. J. 2018, 26, 891–919. [Google Scholar] [CrossRef]
- Omer, M.A.; Zeebaree, S.R.; Sadeeq, M.A.; Salim, B.W.; Mohsin, S.; Rashid, Z.N.; Haji, L.M. Efficiency of malware detection in android system: A survey. Asian J. Res. Comput. Sci. 2021, 2, 59–69. [Google Scholar] [CrossRef]
- Ding, W.; Hu, R.; Yan, Z.; Qian, X.; Deng, R.H.; Yang, L.T.; Dong, M. An extended framework of privacy-preserving computation with flexible access control. IEEE Trans. Netw. Serv. Manag. 2019, 17, 918–930. [Google Scholar] [CrossRef]
- Ding, W.; Yan, Z.; Deng, R.H. Privacy-preserving data processing with flexible access control. IEEE Trans. Dependable Secur. Comput. 2017, 17, 363–376. [Google Scholar] [CrossRef]
- Android Malware Dataset for Machine Learning. Available online: https://www.kaggle.com/datasets/shashwatwork/android-malware-dataset-for-machine-learning (accessed on 14 June 2022).
- CICMalDroid 2020. Available online: https://www.unb.ca/cic/datasets/maldroid-2020.html (accessed on 14 June 2022).
- Glossary|NIST. Available online: https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary (accessed on 1 September 2022).
- What Is Adware. Available online: https://www.kaspersky.com/resource-center/threats/adware (accessed on 1 September 2022).
- Pan, Y.; Ge, X.; Fang, C.; Fan, Y. A systematic literature review of android malware detection using static analysis. IEEE Access 2020, 8, 116363–116379. [Google Scholar] [CrossRef]
- Jogsan, S. A Survey on Permission Based Malware Detection in Android Applications. Int. J. Eng. Res. 2020, 9. Available online: https://www.ijert.org/volume-09-issue-04-april-2020 (accessed on 14 June 2022).
- Mohana, M.; Jagatheesan, S.M. Survey on Permission Based Android Malware Detection Techniques. IJEDR 2019, 7, 3. Available online: https://www.ijedr.org/papers/IJEDR1903136.pdf (accessed on 14 June 2022).
- Kitchenham, B. Procedures for Performing Systematic Reviews; Keele University: Keele, UK, 2004; pp. 1–26. [Google Scholar]
- Aswini, M.; Vinod, P. Droid permission miner: Mining prominent permissions for Android malware analysis. In Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Chennai, India, 17–19 February 2014; pp. 81–86. [Google Scholar] [CrossRef]
- Xiong, P.; Wang, X.; Niu, W.; Zhu, T.; Li, G. Android malware detection with contrasting permission patterns. China Commun. 2014, 11, 1–14. [Google Scholar] [CrossRef]
- Morales-Ortega, S.; Escamilla-Ambrosio, P.J.; Rodriguez-Mota, A.; Coronado-De-Alba, L.D. Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers. In Proceedings of the 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA, 18–21 October 2016; pp. 1–8. [Google Scholar] [CrossRef]
- Sun, L.; Li, Z.; Yan, Q.; Srisa-an, W.; Pan, Y. SigPID: Significant permission identification for android malware detection. In Proceedings of the 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA, 18–21 October 2016; pp. 1–8. [Google Scholar] [CrossRef]
- Shahriar, H.; Islam, M.; Clincy, V. Android malware detection using permission analysis. SoutheastCon 2017, 2017, 1–6. [Google Scholar] [CrossRef]
- Lu, T.; Hou, S. A Two-Layered Malware Detection Model Based on Permission for Android. In Proceedings of the 2018 IEEE International Conference on Computer and Communication Engineering Technology (CCET), Beijing, China, 18–20 August 2018; pp. 239–243. [Google Scholar] [CrossRef]
- Park, J.; Chun, H.; Jung, S. API and permission-based classification system for Android malware analysis. In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 1–12 October 2018; pp. 930–935. [Google Scholar] [CrossRef]
- Ilham, S.; Abderrahim, G.; Abdelhakim, B.A. Permission Based Malware Detection in Android Devices. In Proceedings of the 3rd International Conference on Smart City Applications, Tetouan, Morocco, 10–11 October 2018. [Google Scholar]
- Arora, A.; Peddoju, S.K.; Conti, M. PermPair: Android Malware Detection Using Permission Pairs. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1968–1982. [Google Scholar] [CrossRef]
- Turnip, T.N.; Situmorang, A.; Lumbantobing, A.; Marpaung, J.; Situmeang, S.I.G. Android Malware Classification Based on Permission Categories Using Extreme Gradient Boosting. In Proceedings of the 5th International Conference on Sustainable Information Engineering and Technology, Malang, Indonesia, 16–17 November 2020; pp. 190–194. [Google Scholar]
- Khariwal, K.; Singh, J.; Arora, A. IPDroid: Android Malware Detection using Intents and Permissions. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 197–202. [Google Scholar] [CrossRef]
- Alsoghyer, S.; Almomani, I. On the Effectiveness of Application Permissions for Android Ransomware Detection. In Proceedings of the 2020 6th Conference on Data Science and Machine Learning Applications (CDMA), Riyadh, Saudi Arabia, 4–5 March 2020; pp. 94–99. [Google Scholar] [CrossRef]
- Amer, E. Permission-Based Approach for Android Malware Analysis Through Ensemble-Based Voting Model. In Proceedings of the 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), Cairo, Egypt, 26–27 May 2021; pp. 135–139. [Google Scholar] [CrossRef]
- Arif, J.M.; Razak, M.F.A.; Awang, S.; Mat, S.R.T.; Ismail, N.S.N.; Firdaus, A. A static analysis approach for Android permission-based malware detection systems. PLoS ONE 2021, 16, e0257968. [Google Scholar]
- Manzil, H.H.R.; Naik, M.S. COVID-Themed Android Malware Analysis and Detection Framework Based on Permissions. In Proceedings of the 2022 International Conference for Advancement in Technology (ICONAT), Goa, India, 21–22 January 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Wang, H.; Zhang, W.; He, H. You are what the permissions told me! Android malware detection based on hybrid tactics. J. Inf. Secur. Appl. 2022, 66, 103159. [Google Scholar] [CrossRef]
- Provide Information for Google Play’s Data Safety Section-Play Console Help. Available online: https://support.google.com/googleplay/android-developer/answer/10787469?hl=en (accessed on 1 September 2022).
- Apple’s App Store Has Many Scams—The Washington Post. Available online: https://www.washingtonpost.com/technology/2021/06/06/apple-app-store-scams-fraud/ (accessed on 1 September 2022).
- Cui, H.; Zhou, Y.; Wang, C.; Li, Q.; Ren, K. Towards Privacy-Preserving Malware Detection Systems for Android. In Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018; pp. 545–552. [Google Scholar] [CrossRef]
- Kucuk, Y.; Patil, N.; Shu, Z.; Yan, G. BigBing: Privacy-Preserving Cloud-Based Malware Classification Service. In Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing (PAC), Washington, DC, USA, 26–28 September 2018; pp. 43–54. [Google Scholar] [CrossRef]
- Hsu, R.-H. A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. In Proceedings of the 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan, 20–21 August 2020; pp. 128–136. [Google Scholar] [CrossRef]
- Wei, W.; Wang, J.; Yan, Z.; Ding, W. EPMDroid: Efficient and Privacy-Preserving Malware Detection Based on SGX through Data Fusion. Information Fusion. Inf. Fusion 2022, 82, 43–57. [Google Scholar] [CrossRef]
- Android Releases|Android Developers. Available online: https://developer.android.com/about/versions (accessed on 2 September 2022).
- Mohamed, S.E.; Ashaf, M.; Ehab, A.; Shereef, O.; Metwaie, H.; Amer, E. Detecting Malicious Android Applications Based on API calls and Permissions Using Machine learning Algorithms. In Proceedings of the 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), Cairo, Egypt, 26–27 May 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Android Open Source Project. Available online: https://source.android.com/ (accessed on 2 September 2022).
- Zhou, Y.; Jiang, X. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 24–25 May 2012; pp. 95–109. [Google Scholar] [CrossRef] [Green Version]
- Lin, K.Y.; Huang, W.R. Using federated learning on malware classification. In Proceedings of the 2020 22nd International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 16–19 February 2020; pp. 585–589. [Google Scholar]
- Alazab, M.; Rm, S.P.; Parimala, M.; Maddikunta, P.K.R.; Gadekallu, T.R.; Pham, Q.V. Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions. IEEE Trans. Ind. Inform. 2021, 18, 3501–3509. [Google Scholar] [CrossRef]
- McDole, A.; Abdelsalam, M.; Gupta, M.; Mittal, S. Analyzing CNN based behavioural malware detection techniques on cloud IaaS. In International Conference on Cloud Computing; Springer: Cham, Switzerland, 2020; pp. 64–79. [Google Scholar]
- Gera, T.; Singh, J.; Thakur, D.; Faruki, P. A semi-automated approach for identification of trends in android ransomware literature. In International Conference on Machine Learning for Networking; Springer: Cham, Switzerland, 2020; pp. 265–283. [Google Scholar]
- Venkatraman, S.; Alazab, M.; Vinayakumar, R. A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 2019, 47, 377–389. [Google Scholar] [CrossRef]
- Mercaldo, F.; Santone, A. Deep learning for image-based mobile malware detection. J. Comput. Virol. Hacking Tech. 2020, 16, 157–171. [Google Scholar] [CrossRef]
- Jian, Y.; Kuang, H.; Ren, C.; Ma, Z.; Wang, H. A novel framework for image-based malware detection with a deep neural network. Comput. Secur. 2021, 109, 102400. [Google Scholar] [CrossRef]
Database | Papers Count |
---|---|
IEEE Xplore | 12 |
ACM | 2 |
Scopus | 2 |
Ref. | Title | Analysis Tech. Used | Machine Learning Classifier(s) Used/Developed | Tools Used (If Any) | Year |
---|---|---|---|---|---|
[16] | Droid permission miner: Mining prominent permissions for Android malware analysis | Static Analysis | Naïve Bayes, AdaBoost, Random forest | Androguard (to generate human-readable manifest file) | 2014 |
[17] | Android malware detection with contrasting permission patterns | Hybrid permission profile (normal, malware, common) | Enclamald | Weka (for classifier comparison) | 2014 |
[18] | Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers | Static Analysis | SMO used by SVM, Random Forest, Random Committee with Random Tree, and Random Committee with Random Forest | Android AssetPackaging Tool (AAPT) for obtaining features | 2016 |
[19] | SigPID: significant permission identification for android malware detection | Static Analysis | SVM (Support Vector Machine) | N/A | 2016 |
[20] | Android malware detection using permission analysis | Static Analysis | N/A | Apktool for decompiling .apk build files | 2017 |
[21] | A Two-Layered Malware Detection Model Based on Permission for Android | Static Analysis | Random Forest | Eclipse (for java development) | 2018 |
[22] | API and permission-based classification system for Android malware analysis | Static Analysis | N/A (to be used in future work) | YARA (for identifying malware using pattern matching) | 2018 |
[23] | Permission Based Malware Detection in Android Devices | Static Analysis | Random Forest, SVM | Androguard (for extracting permissions) | 2018 |
[24] | PermPair: Android Malware Detection Using Permission Pairs | Static Analysis | N/A | N/A | 2019 |
[25] | Android Malware Classification Based on Permission Categories Using Extreme Gradient Boosting | Static Analysis | XGBoost | Androguard (for extracting permissions from .apk files) | 2020 |
[26] | IPDroid: Android Malware Detection using Intents and Permissions | Static Analysis | Random Forest, SVM, Naive Bayes | VirusTotal (to test malicious app dataset), Apktool (for permission extraction) | 2020 |
[27] | On the Effectiveness of Application Permissions for Android Ransomware Detection | Hybrid (Static and Dynamic analysis) | Random Forest (RF), Decision Trees, Sequential minimal optimization algorithm (SMO), Naive Bayes (NB) | Apktool (to decompile .apk file and get manifest information) | 2020 |
[28] | Permission-Based Approach for Android Malware Analysis Through Ensemble-Based Voting Model | Static Analysis | Random Forest, MLP, AdaBoost, SVM, Decision Tree | N/A | 2021 |
[29] | A static analysis approach for Android permission-based malware detection systems | Static Analysis | Random Forest, kNN, MLP, J48, Adaboost (Random Forest has the highest accuracy) | WEKA (machine learning tool for evaluation) | 2021 |
[30] | COVID-Themed Android Malware Analysis and Detection Framework Based on Permissions | Static Analysis | Decision Tree, Random Forest | Androguard (for decompiling .apk files), APKAnalyzer (for permission extraction) | 2022 |
[31] | You are what the permissions told me! Android malware detection based on hybrid tactics | Hybrid (Static and Dynamic analysis) | TextCNN | AHAT (for heap analysis) | 2022 |
Ref. | Title | Accuracy(%) |
---|---|---|
[16] | Droid permission miner: Mining prominent permissions for Android malware analysis | 82.48 |
[17] | Android malware detection with contrasting permission patterns | 94.38 |
[18] | Native malware detection in smartphones with android OS using static analysis, feature selection and ensemble classifiers | 96.26 |
[19] | SigPID: significant permission identification for android malware detection | 93.62 |
[20] | Android malware detection using permission analysis | 82.33 |
[21] | A Two-Layered Malware Detection Model Based on Permission for Android | 83.60 |
[22] | API and permission-based classification system for Android malware analysis | NA (not reported) |
[23] | Permission Based Malware Detection in Android Devices | 93 |
[24] | PermPair: Android Malware Detection Using Permission Pairs | 95.44 |
[25] | Android Malware Classification Based on Permission Categories Using Extreme Gradient Boosting | 75.55 |
[26] | IPDroid: Android Malware Detection using Intents and Permissions | 94.73 |
[27] | On the Effectiveness of Application Permissions for Android Ransomware Detection | 96.90 |
[28] | Permission-Based Approach for Android Malware Analysis Through Ensemble-Based Voting Model | 99.3 |
[29] | A static analysis approach for Android permission-based malware detection systems | 91.60 |
[30] | COVID-Themed Android Malware Analysis and Detection Framework Based on Permissions | 83 |
[31] | You are what the permissions told me! Android malware detection based on hybrid tactics | 99.80 |
Ref. | Dataset(s) Used |
---|---|
[16] | Contagiodump |
[17] | Custom dataset was developed using apps downloaded from SlideME and Pandaapp. In addition, a dataset published by Zhou et al. [41] was used |
[18] | Derbin |
[19] | Dataset was custom developed after downloading 5494 randomly selected apps from Google Play. The article does not state the availability or other details about this dataset |
[20] | Malgenome project and Contagio |
[21] | Datasets collected from Baidu application market and North Carolina State University’s Android Malware Genemo Project |
[22] | N/A (future works would include using machine learning) |
[23] | AMD Projects |
[24] | Genome, Derbin, Koodous, Contagio, PwnZen |
[25] | Koodous |
[26] | Genome, Derbin, Koodous |
[27] | Dataset-R (from HelDroid, RansomProper, Virus Total, and Koodoud)Dataset-B (from Google Play) |
[28] | Derbin, MalGenome |
[29] | Drebin, Androzoo |
[30] | The authors collected COVID-related apps from different sources including Google Play and GitHub, and the dataset was custom-created using feature elimination techniques. The dataset has not been released for public use. |
[31] | As reported by the authors, the dataset was custom-made after collecting and processing more than 12,364 malware apps and 9344 clean apps from Google Play. The dataset has not been released for public use. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ehsan, A.; Catal, C.; Mishra, A. Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review. Sensors 2022, 22, 7928. https://doi.org/10.3390/s22207928
Ehsan A, Catal C, Mishra A. Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review. Sensors. 2022; 22(20):7928. https://doi.org/10.3390/s22207928
Chicago/Turabian StyleEhsan, Adeel, Cagatay Catal, and Alok Mishra. 2022. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review" Sensors 22, no. 20: 7928. https://doi.org/10.3390/s22207928
APA StyleEhsan, A., Catal, C., & Mishra, A. (2022). Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review. Sensors, 22(20), 7928. https://doi.org/10.3390/s22207928