Skip to content

Obi Wan : "these aren't the droids that you are looking for"

License

Notifications You must be signed in to change notification settings

seekshreyas/obidroid

Folders and files

NameName
Last commit message
Last commit date

Latest commit

94ff183 · Feb 16, 2015
Dec 8, 2013
Dec 6, 2013
Jun 22, 2014
Mar 30, 2014
Mar 31, 2014
Apr 25, 2014
Dec 4, 2013
Apr 27, 2014
May 5, 2014
Dec 3, 2013
Nov 26, 2013
Dec 16, 2013
Mar 26, 2014
Jun 6, 2014
Dec 7, 2013
Mar 31, 2014
May 5, 2014
Dec 15, 2013
Oct 16, 2013
Mar 16, 2014
Mar 22, 2014
Mar 30, 2014
Mar 26, 2014
Oct 31, 2013
Feb 23, 2014
Jun 5, 2014
Jun 19, 2014
Mar 31, 2014
Dec 9, 2013
Feb 23, 2014
Dec 5, 2013
Dec 16, 2013
Dec 8, 2013
Mar 2, 2014
May 2, 2014
Dec 3, 2013
Dec 3, 2013
Jun 6, 2014
May 2, 2014
Dec 3, 2013
Dec 17, 2013
Dec 17, 2013
May 2, 2014
Dec 15, 2013
May 1, 2014

Repository files navigation

obidroid

Obi Wan : "these aren't the droids that you are looking for"

Background:

Google’s Android platform is currently the most popular smartphone platform in the world, with over 50% of the market, and over 10 billion app downloads. Due in part to the platform’s popularity, Android malware is a pervasive and increasingly troublesome problem. At its most benign, Android malware consists of adware. More malicious Android malware can potentially steal user information, transmit GPS data, insert banking Trojans, send premium texts, or transform the phone into a bot to be used in a denial of service attack or spam campaign. Laboratory studies provide some background on user motivation in installing apps and granting permission. Users prefer apps requesting fewer permissions, yet certain factors such as brand popularity often sway them to make the opposite choice. A separate study observed low attention and comprehension rates in the majority of users when reading information about privacy policy and app permissions. Most noticeably, permissions and privacy information are not available on the primary Google Play store screen. By the time a user learns about the permissions required by the app, they have already made the decision to buy it.

Proposal:

We aim to sift through the android app store applications and build a flagging system based on key features to indicate applications that may be engaging in malicious software/policy practices. Some of the key features that could serve as indicators could be stars, user permission settings and key application features (to ascertain if the requirements meet the consequences) as well as user comment feedback of people who have reviewed and or used those applications. We aim to develop this as a set of heuristics that could be employed to develop and active flagging auditing of app stores to protect user’s interests.

Some things to look at

  1. Negative sentiment (comments) and user removal
  2. Fake Positive sentiment despite app giving out information/containing malware (user is unaware)
  3. Stars
  4. Developer site routes to invalid address or google homepage
  5. Problem Scenario - Amazon's Mechanical turk is a way to get fake reviews: 6. unusual number of 5 star ratings on a new app 7. Timing of reviews: all reviews immediately after it arrived in store
  6. Poor grammar (or very good grammar): Does Wordnet have a way that analyzes grammar?
  7. Apps from the same developer: receive greater trust – so maybe the most popular app is benign, but a developer might put malware on a later app. Apps can also each contain a piece of malware which is activated when multiple apps are downloaded. Many developers also use the same key to sign.
  8. Malware targets trends – ie around the Olympic Games, a lot of malware snuck onto Olympic apps
  9. several reviews are very similar in style

X Permissions: browser history, Google accounts, contacts, internet access, or phone identity

X Permissions requested are radically different from purpose of app