Research Article
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination
Table 3
Feature scale comparison table.
| Feature i/feature j | Scale comparison |
| Dangerous permission of app/dangerous permission of component | 1/7 | Dangerous permission of app/sensitive API calls | 1/5 | Dangerous permission of app/sensitive data flow acquisition | 1/3 | Dangerous permission of app/component Intent communication | 1/5 | Dangerous permission of app/sensitive data transition | 1/7 | Dangerous permission of component/sensitive API calls | 5/1 | Dangerous permission of component/sensitive data flow acquisition | 3/1 | Dangerous permission of component/component Intent communication | 2/1 | Dangerous permission of component/sensitive data transition | 1/1 | Sensitive API calls/sensitive data flow acquisition | 1/1 | Sensitive API calls/component Intent communication | 1/1 | Sensitive API calls/sensitive data transition | 1/3 | Sensitive data flow acquisition/component Intent communication | 1/3 | Sensitive data flow acquisition/sensitive data transition | 1/3 | Component intent communication/sensitive data transition | 1/3 |
|
|