Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automated Spyware Detection Using End User License Agreements
Responsible organisation
2008 (English)Conference paper, (Refereed) PublishedAlternative title
Automatisk detektion av spyware genom klassificering av slutanvändarlicenser (Swedish)
Abstract [en]

The amount of spyware increases rapidly over the Internet and it is usually hard for the average user to know if a software application hosts spyware. This paper investigates the hypothesis that it is possible to detect from the End User License Agreement (EULA) whether its associated software hosts spyware or not. We generated a data set by collecting 100 applications with EULAs and classifying each EULA as either good or bad. An experiment was conducted, in which 15 popular default-configured mining algorithms were applied on the data set. The results show that 13 algorithms are significantly better than random guessing, thus we conclude that the hypothesis can be accepted. Moreover, 2 algorithms also perform significantly better than the current state-of-the-art EULA analysis method. Based on these results, we present a novel tool that can be used to prevent the installation of spyware.

Abstract [sv]

Spridandet av spyware har ökat dramatiskt och det är ofta svårt för användaren att veta om spyware kommer att installeras samtidigt som en nedladdat applikation skall installeras. Den här studien undersöker om det är möjligt att avgöra om en applikation innehåller spyware genom att applicera data mining tekniker på applikationens slutanvändarlicens.

Place, publisher, year, edition, pages
Busan, Korea: IEEE , 2008.
Keyword [en]
eula, classification, data mining, supervised learning
National Category
Computer Science
Identifiers
URN: urn:nbn:se:bth-8608ISI: 000256051100085Local ID: oai:bth.se:forskinfo5DB188280052F60AC125743A0022017EOAI: oai:DiVA.org:bth-8608DiVA: diva2:836349
Conference
2nd International Conference on Information Security and Assurance
Note
Copyright © 2008 IEEE. Reprinted from the proceedings of the 2nd International Conference on Information Security and Assurance . This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products or services Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending a blank email message to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.Available from: 2012-09-18 Created: 2008-04-29 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(135 kB)69 downloads
File information
File name FULLTEXT01.pdfFile size 135 kBChecksum SHA-512
a6db0eb24f3d37797a57f370bd41724efd5362365e47279a5c12767edbb6b6f23d42edb11cbadfb5ae64d2ee73099fedcbcf69acbe7546978b6a7870efc3866d
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Boldt, MartinLavesson, Niklas
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 69 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 65 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf