Learning to Detect Spyware using End User License Agreements

DSpace Repository

Learning to Detect Spyware using End User License Agreements

Show full item record

Files for download


Simple item record

Publication Article, peer reviewed scientific
Title Learning to Detect Spyware using End User License Agreements
Author(s) Lavesson, Niklas ; Boldt, Martin ; Davidsson, Paul ; Jacobsson, Andreas
Date 2011
English abstract
The amount of software that hosts spyware has increased dramatically. To avoid legal repercussions, the vendors need to inform users about inclusion of spyware via end user license agreements (EULAs) during the installation of an application. However, this information is intentionally written in a way that is hard for users to comprehend. We investigate how to automatically discriminate between legitimate software and spyware associated software by mining EULAs. For this purpose, we compile a data set consisting of 996 EULAs out of which 9.6% are associated to spyware. We compare the performance of 17 learning algorithms with that of a baseline algorithm on two data sets based on a bag-of-words and a meta data model. The majority of learning algorithms significantly outperform the baseline regardless of which data representation is used. However, a non-parametric test indicates that bag-of-words is more suitable than the meta model. Our conclusion is that automatic EULA classification can be applied to assist users in making informed decisions about whether to install an application without having read the EULA. We therefore outline the design of a spyware prevention tool and suggest how to select suitable learning algorithms for the tool by using a multi-criteria evaluation approach.
DOI http://dx.doi.org/10.1007/s10115-009-0278-z (link to publisher's fulltext)
Publisher Springer Verlag
Host/Issue Knowledge and Information Systems;2
Volume 26
ISSN 0219-1377
Pages 285-307
Language eng (iso)
Subject(s) End user license agreement
Document classification
Research Subject Categories::TECHNOLOGY::Information technology::Computer science::Computer science
Handle http://hdl.handle.net/2043/11150 (link to this page)

This item appears in the following Collection(s)

Show full item record



My Account