#URL
#Change Log
When | What |
---|---|
April 1st, 2015 | Donated by Alessandra Gorla |
#Reference
Studies who have been using the data (in any form) are required to include the following reference:
@inproceedings{GorlaetAl:CHABADA:ICSE:2014,
author = {Alessandra Gorla and Ilaria Tavecchia and Florian Gross and Andreas Zeller},
title = {Checking App Behavior Against App Descriptions},
booktitle = {ICSE'14: Proceedings of the 36th International Conference on Software Engineering},
location = {Hyderabad (India), 31 May - 7 June},
year = {2014},
}
#About the Data
##Overview of Data
How do we know a program does what it claims to do? After clustering Android apps by their description topics, we identify outliers in each cluster with respect to their API usage. A “weather” app that sends messages thus becomes an anomaly; likewise, a “messaging” app would typically not be expected to access the current location. Applied on a set of 22,500+ Android applications, our CHABADA prototype identified several anomalies; additionally, it flagged 56% of novel malware as such, without requiring any known malware patterns.