Research Article

Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination

Table 3

Feature scale comparison table.

Feature i/feature jScale comparison

Dangerous permission of app/dangerous permission of component1/7
Dangerous permission of app/sensitive API calls1/5
Dangerous permission of app/sensitive data flow acquisition1/3
Dangerous permission of app/component Intent communication1/5
Dangerous permission of app/sensitive data transition1/7
Dangerous permission of component/sensitive API calls5/1
Dangerous permission of component/sensitive data flow acquisition3/1
Dangerous permission of component/component Intent communication2/1
Dangerous permission of component/sensitive data transition1/1
Sensitive API calls/sensitive data flow acquisition1/1
Sensitive API calls/component Intent communication1/1
Sensitive API calls/sensitive data transition1/3
Sensitive data flow acquisition/component Intent communication1/3
Sensitive data flow acquisition/sensitive data transition1/3
Component intent communication/sensitive data transition1/3