Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on permissions. However, most them ignore specific permission combinations and categories that affect the accuracy. The features they extracted are neither representative enough distinguish benign applic...