Username   Password       Forgot your password?  Forgot your username? 


A Method of Dynamically Associating Behavior Risks based on Time Thread in Smartphones

Volume 14, Number 5, May 2018, pp. 1014-1022
DOI: 10.23940/ijpe.18.05.p20.10141022

Zhenliu Zhoua, Xiaoming Zhoub, Weichun Geb, Yueming Panc, and Yu Guc

aShenyang Key Laboratory of Information Security for Power System, Shenyang Institute of Engineering, Shenyang, 110136, China
bState Grid Liaoning Electric Power Co., Ltd, Shenyang, 110004, China
cState Grid Liaoning Electric Power Co., Ltd, Jinzhou, 121000, China

(Submitted on February 21, 2018; Revised on March 26, 2018; Accepted on April 29, 2018)


Behavior associated risks are analyzed and detected based on a series of software behaviors and user behaviors in a smartphone. Based on time threads, a method of dynamically associating and analyzing risks of behaviors is proposed. According to the time sequence of the behavior occurrence, the behaviors are organized into a behavior associated graph with time threads. Associated analysis and detection of risks among behaviors are achieved through matching association rules. The advantage of this method is that it cannot only realize dynamic analysis while behavior occurs, but can also realize static postmortem analysis using collected data sets. The dynamic association of behavior risk based on time thread improves behavior risk analysis and realizes the real-time risk detection in smartphones. Formalized definitions of behavior and behavior associated graphs are presented. Algorithms of behavior risk associating are described, and the results of the experimental analysis are given.


References: 17

      1. M. K. Alzaylaee,S. Y. Yerima,S. Sezer. “EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning”. ACM on International Workshop on Security and Privacy Analytics ACM, 2017:65-72.
      2. I. Burguera,U. Zurutuza,S. Nadjm-Tehrani. “Crowdroid: Behavior-based Malware Detection System for Android”. ACM Workshop on Security and Privacy in Smartphones and Mobile Devices ACM, 2011:15-26.
      3. D. Chen, H. M. Zhang, X. L. Zhang. “Detection of Android Malware Security on System Calls”. Advanced Information Management, Communicates, Electronic and Automation Control Conference IEEE, 2017:974-978.
      4. P. Q. Chen. “Software Behavior Based Trustworthiness Attestation for Computing Platform”. Journal of Software 7.1(2012):55-60.
      5. X. Q. Cheng, X. L. Jin, Y. Z. Wang. “Survey on Big Data System and Analytic Technology”. Journal of Software,2014,25(9):1889−1908.
      6. M. Dhingra. “Legal Issues in Secure Implementation of Bring Your Own Device (BYOD)”. Procedia Computer Science, 2016, 78:179-184.
      7. M. Donner. “Toward a Security Ontology”. IEEE Security & Privacy1.3(2003):6-7.
      8. W. Dan. “Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology”. Journal of Beijing University of Technology, 39.5(2013):713-721.
      9. W. Enck,D. Octeau,P. Mcdaniel,S. Chaudhuri. “A Study of Android Application Security”. Usenix Conference on Security USENIX Association, 2011:21-21.
      10. L. G. Lei, J. W. Jing, Y. W. Wang, Z. W. Zhang. “A Behavior-Based System Resources Access Control Scheme for Android”. Journal of Computer Research and Development, 2014,51(5):1028-1038.
      11. Z. M. Lin. “Classifying Android Malware with Dynamic Behavior Dependency Graphs”. Trustcom/bigdatase/ispa IEEE, 2017:378-385.
      12. J. Y. Liang, C. J. Feng, P. Song. “A Survey on Correlation Analysis of Big Data”. Chinese Journal of Computers, 2016(1):1-28.
      13. M. Schur,A. Roth,A. Zeller. “Mining Behavior Models from Enterprise Web Applications”. Joint Meeting on Foundations of Software Engineering 2013:422-432.
      14. Z. H. Tan. “A Novel Trust Model Based on SLA and Behavior Evaluation for Clouds”. Privacy, Security and Trust IEEE, 2017:581-587.
      15. J. Tian,H. Jiao. “A Kind of Dynamic Software Behavior Trust Model Based on Improved Subjective Logic”. Intelligent Automation & Soft Computing (2016):1-9.
      16. Q. Q. Ye. “Analyzing Security Property of Android Application Implementation Using Formal Method”. International Conference on Engineering of Complex Computer Systems IEEE, 2016:214-217.
      17. L. Zhuang,M. Cai,L. Chen. “Software Behavior-Based Trusted Dynamic Measurement”. Journal of Wuhan University 56.2(2010):133-137.


          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

          This site uses encryption for transmitting your passwords.