Estimate Risks Eate for Android Applications Using Android Permissions | IGI Global Scientific Publishing
Estimate Risks Eate for Android Applications Using Android Permissions

Estimate Risks Eate for Android Applications Using Android Permissions

Latifa Er-Rajy (FSSM Marrakech, Morocco), My Ahmed El Kiram (Cadi Ayyad University, Morocco), and Mohamed El Ghazouani (Faculty of Science, Semlalia, Morocco)
Copyright: © 2021 |Volume: 12 |Issue: 4 |Pages: 15
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781799860112|DOI: 10.4018/IJMCMC.289162
Cite Article Cite Article

MLA

Er-Rajy, Latifa, et al. "Estimate Risks Eate for Android Applications Using Android Permissions." IJMCMC vol.12, no.4 2021: pp.17-31. https://doi.org/10.4018/IJMCMC.289162

APA

Er-Rajy, L., El Kiram, M. A., & El Ghazouani, M. (2021). Estimate Risks Eate for Android Applications Using Android Permissions. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 12(4), 17-31. https://doi.org/10.4018/IJMCMC.289162

Chicago

Er-Rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "Estimate Risks Eate for Android Applications Using Android Permissions," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 12, no.4: 17-31. https://doi.org/10.4018/IJMCMC.289162

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In recent years, Android became the first target for hackers and malware developers due to its inefficient permission model. In this article, the authors introduce a tool called PerUpSecure to manage permissions requested by Android applications, calculate the risk rates, and display the results to the user in order to help him to make a better decision. Thanks to our PerUpSecure, the user will be able to install only the trusted applications. As far as the authors know, the other existing tools focus only on measuring app risk after being installed and not before as this tool does. Therefore, to evaluate the tool, they selected two different applications sets. The results show that the tool can produce the most trustworthy risk rate to prevent and detect potential malicious activities performed by malware.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.