期刊文献+

一种Android恶意程序检测工具的实现 被引量:7

Implementation of a Malware Detect Tool on Android
下载PDF
导出
摘要 目前,Android上恶意程序的识别主要通过静态检测,但普遍识别率不高。文章基于静态检测原理,使用了一种基于行为的检测方法,以变量跟踪以及函数等价匹配的方式来判断一个Android安装包中是否存在恶意行为,从而增大了静态检测的准确率。在文章中,以短信吸费程序为样本,实现了这种基于行为分析的恶意程序检测工具。并在测试中证明了它的有效性。 At present, malware is mainly detected through static-based approach, but the recognition rate is low. Based on the mechanism of static detection, this paper gave a behavior-based approach which analysis the behavior of sensitive function in the application. In this way, using the traces of variables and equivalent function matching to determine whether an Android package have malicious behavior. The behavior-based approach improves the accuracy of the static detection. This paper implement a detect tool aim at SMS Trojan and is proved its effectiveness in testing.
出处 《信息网络安全》 2013年第1期27-32,共6页 Netinfo Security
基金 国家自然科学基金资助项目[61170282]
关键词 ANDROID 恶意程序检测 行为分析 Android malware detection behavior analysis
  • 相关文献

参考文献9

  • 1冯登国;赵险峰.信息安全技术概论[M]北京:机械工业出版社,2009.
  • 2王蕊,冯登国,杨轶,苏璞睿.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-393. 被引量:74
  • 3宋杰,党李成,郭振朝,赵萌.Android OS手机平台的安全机制分析和应用研究[J].计算机技术与发展,2010,20(6):152-155. 被引量:69
  • 4Samuel T King,Peter M Chen. Subvert Implementing Malware With Virtual Machines[J].University of Michigan,2006.
  • 5Schwartz. Mathew[M].Reverse-Engineering,2001.
  • 6lib. zlib source code[EB/OL].http://www.zlib.net/,.
  • 7Wiki Pedia. Zip file format[EB/OL].http://en.wikipedia.org/wiki/ZIP_(file_format),.
  • 8Google. Dalvik Executable Format[EB/OL].http://source.android.com/tech/dalvik/dex-format.html,.
  • 9Google. Bytecode for the Dalvik VM[EB/OL].http://source.android.com/tech/dalvik/dalvik-bytecode.html,.

二级参考文献12

  • 1刘磊,刘克胜.Symbian操作系统下手机病毒免疫技术研究[J].网络安全技术与应用,2006(11):89-91. 被引量:7
  • 2李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 3Android中文网(androidcn.net).What is Android[EB/OL].2007-12-17.http://sdk.androidin.com/what-is-an-droid.html.
  • 4Henricksen M,Caelli P.Securing grid data using mandatory access controls[C] //Fifth Australasian Symposium on Grid Computing and e-Research(AusGrid 2007).[s.1.] :[s.n.].2007:25-32.
  • 5Gramlich N.Android Programming[EB/OL].2008-02-21.http://andbook.anddev.org.
  • 6Katysovas T.A first at Google Android[M].[s.1.] :Free University of Bolzano,2008:12-26.
  • 7DiMarzio J.Android A Programer's Guide[M].[s.1.] :Me-Graw-Hill/Osborne Media,2008.
  • 8Meier R.Professional Android Application[M].[s.1.] :Wiley,John & Sons,Incorporated,2008.
  • 9Pilgrim M.Anatomy & Physiology of an Android[EB/OL].2008-06-09.http://www.youtube.com/warch?v=In-K-p-PrGE.
  • 10李舒亮,习军.基于Linux的数据安全传输的研究[J].微计算机信息,2008,24(24):18-20. 被引量:5

共引文献141

同被引文献187

  • 1闫友彪,陈元琰.机器学习的主要策略综述[J].计算机应用研究,2004,21(7):4-10. 被引量:56
  • 2邓凡平.深入理解Android卷1[M].北京:机械工业出版社,2011.
  • 3Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 4Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 5Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 6Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 7La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 8Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 9Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 10Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.

引证文献7

二级引证文献123

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部