TY - JOUR
T1 - A novel method to find important apps base on the analysis of components relationship
AU - Li, Qi
AU - Li, Chengze
AU - Gao, Guangyu
AU - Huang, Yanyi
N1 - Publisher Copyright:
© 2017, Springer Science+Business Media, LLC.
PY - 2019/5/1
Y1 - 2019/5/1
N2 - With the mobile Internet rapidly developing and the number of mobile applications increasing sharply, the security of the mobile apps has been paid more and more attention in recent years. Many analysis methods for single app have been used in detecting the vulnerability and malicious code. Since mobile apps always related to each other by invoking components, some researchers began to focus on the analysis for multi-applications. But facing with millions of mobile applications, with limited resources, how to improve the ability of security analysis and protection is a difficult problem. For this purpose, we introduce a novel method to mine the correlation among a large number of applications, and finding the nodes that are in the critical position in the process of invoking components. In the proposed method, we first extract the important information from apps and build a database of components. Then, we try to analysis the potential relationship of apps based on the process of invoking components. Moreover, we proposed a novel metric of importance, which can help to find the apps which play important roles in the app-network. We did some experiments to evaluate the proposed method, the experiments show that, we can assess the influence of apps, and figure out the priority of targets during massive application analysis, whether for purpose of detection or protection.
AB - With the mobile Internet rapidly developing and the number of mobile applications increasing sharply, the security of the mobile apps has been paid more and more attention in recent years. Many analysis methods for single app have been used in detecting the vulnerability and malicious code. Since mobile apps always related to each other by invoking components, some researchers began to focus on the analysis for multi-applications. But facing with millions of mobile applications, with limited resources, how to improve the ability of security analysis and protection is a difficult problem. For this purpose, we introduce a novel method to mine the correlation among a large number of applications, and finding the nodes that are in the critical position in the process of invoking components. In the proposed method, we first extract the important information from apps and build a database of components. Then, we try to analysis the potential relationship of apps based on the process of invoking components. Moreover, we proposed a novel metric of importance, which can help to find the apps which play important roles in the app-network. We did some experiments to evaluate the proposed method, the experiments show that, we can assess the influence of apps, and figure out the priority of targets during massive application analysis, whether for purpose of detection or protection.
KW - Allocate efficiently
KW - Metrics of importance
KW - Mobile application
KW - Vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85033497191&partnerID=8YFLogxK
U2 - 10.1007/s10586-017-1308-3
DO - 10.1007/s10586-017-1308-3
M3 - Article
AN - SCOPUS:85033497191
SN - 1386-7857
VL - 22
SP - 5479
EP - 5489
JO - Cluster Computing
JF - Cluster Computing
ER -