Learning to detect spyware using end user license agreements

  • Authors:
  • Niklas Lavesson;Martin Boldt;Paul Davidsson;Andreas Jacobsson

  • Affiliations:
  • Blekinge Institute of Technology, School of Computing, 371 25, Ronneby, Sweden;Blekinge Institute of Technology, School of Computing, 371 25, Ronneby, Sweden;Blekinge Institute of Technology, School of Computing, 371 25, Ronneby, Sweden and Malmö University, School of Technology, Malmö, Sweden;Malmö University, School of Technology, Malmö, Sweden

  • Venue:
  • Knowledge and Information Systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The amount of software that hosts spyware has increased dramatically. To avoid legal repercussions, the vendors need to inform users about inclusion of spyware via end user license agreements (EULAs) during the installation of an application. However, this information is intentionally written in a way that is hard for users to comprehend. We investigate how to automatically discriminate between legitimate software and spyware associated software by mining EULAs. For this purpose, we compile a data set consisting of 996 EULAs out of which 9.6% are associated to spyware. We compare the performance of 17 learning algorithms with that of a baseline algorithm on two data sets based on a bag-of-words and a meta data model. The majority of learning algorithms significantly outperform the baseline regardless of which data representation is used. However, a non-parametric test indicates that bag-of-words is more suitable than the meta model. Our conclusion is that automatic EULA classification can be applied to assist users in making informed decisions about whether to install an application without having read the EULA. We therefore outline the design of a spyware prevention tool and suggest how to select suitable learning algorithms for the tool by using a multi-criteria evaluation approach.