期刊文献+

基于Android平台的访问权限机制优化方案 被引量:6

Optimization Scheme of Access Permission Mechanism Based on Android Platform
下载PDF
导出
摘要 为提高Android平台访问权限机制的安全性,提出一种基于Android平台的访问权限安全优化方案。将应用程序权限定向分为4类,获取不同权限组合的种类,量化其权限组合的安全威胁值,同时考虑免费应用程序更有可能是恶意程序的特点,通过应用程序权限安全威胁值判断其安全威胁级别。实验结果表明,该方案能有效区分应用程序的安全威胁级别,准确判断应用程序的安全威胁程度,提高Android访问控制安全性。 To improve the problem of the security of Android access permission mechanism, this paper proposes an optimization scheme for access permission security based on Android platform. It divides the Android permission into four categories, acquires categories of different permission combination, quantifies the permission combination security threat values and takes fact that free applications are more likely for malicious applications than paid applications into consideration, for judging application security threat level by application access permission security threat value. Experimental results show that the permission access security mechanism can effectively detect security threat level of applications, judge the degree of application security threat more accurately and achieve the goal of enhancing the security of Android access control.
出处 《计算机工程》 CAS CSCD 2013年第5期144-147,共4页 Computer Engineering
基金 国家科技重大专项基金资助项目(2011ZX03002-004-02) 浙江省重点科技创新团队基金资助项目(2012R10009-04) 浙江省杰出青年科学基金资助项目(R1110416) 教育部高等学校博士学科点专项科研基金资助项目(20113305110002) 宁波市科技创新团队基金资助项目(2011B81002)
关键词 ANDROID平台 访问权限 权限分类 权限组合 安全威胁值 定向分类 Android platform access permission permission classification permission combination security threat value directional classification
  • 相关文献

参考文献3

二级参考文献25

  • 1刘磊,刘克胜.Symbian操作系统下手机病毒免疫技术研究[J].网络安全技术与应用,2006(11):89-91. 被引量:7
  • 2Android中文网(androidcn.net).What is Android[EB/OL].2007-12-17.http://sdk.androidin.com/what-is-an-droid.html.
  • 3Henricksen M,Caelli P.Securing grid data using mandatory access controls[C] //Fifth Australasian Symposium on Grid Computing and e-Research(AusGrid 2007).[s.1.] :[s.n.].2007:25-32.
  • 4Gramlich N.Android Programming[EB/OL].2008-02-21.http://andbook.anddev.org.
  • 5Katysovas T.A first at Google Android[M].[s.1.] :Free University of Bolzano,2008:12-26.
  • 6DiMarzio J.Android A Programer's Guide[M].[s.1.] :Me-Graw-Hill/Osborne Media,2008.
  • 7Meier R.Professional Android Application[M].[s.1.] :Wiley,John & Sons,Incorporated,2008.
  • 8Pilgrim M.Anatomy & Physiology of an Android[EB/OL].2008-06-09.http://www.youtube.com/warch?v=In-K-p-PrGE.
  • 9Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38.
  • 10Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945.

共引文献117

同被引文献39

  • 1WANG Y, HARIHARAN S, ZHAO C, et al. Compac: enforce component-level access control in Android[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2014:25-36.
  • 2STACH C, MITSCHANG B. Privacy management for mobile platforms-a review of concepts and approaches[C]//Proceedings of the 14th IEEE International Conference on Mobile Data Management. Piscataway: IEEE Press, 2013,1:305-313.
  • 3BAI G, GU L, FENG T, et al. Context-aware usage control for Android[M]//JAJODIA S, ZHOU J. Security and Privacy in Communication Networks. Berlin: Springer, 2010,50:326-343.
  • 4NAUMAN M, KHAN S, ZHANG X. Apex: extending Android permission model and enforcement with user-defined runtime constraints[C]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010:328-332.
  • 5de MELO L L, ZORZO S D. PUPDroid-personalized user privacy mechanism for Android[C]//Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2012:1479-1484.
  • 6KAUR A, UPADHYAY D. PeMo: modifying application's permissions and preventing information stealing on smartphones[C]//Proceedings of the 5th International Conference-Confluence the Next Generation Information Technology Summit. Piscataway: IEEE, 2014: 905-910.
  • 7ROSEN S, QIAN Z, MAO Z M. AppProfiler: a flexible method of exposing privacy-related behavior in Android applications to end users[C]//Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2013:221-232.
  • 8JING Y, AHN G J, ZHAO Z, et al. RiskMon: continuous and au- tomated risk assessment of mobile applications [ C]//Proceedings of the 4th ACM Conference on Data and Application Security and Pri- vacy. New York: ACM, 2014:99 - 110.
  • 9RASSAMEEROJ I, TANAHASHI Y. Various approaches in analyzing Android applications with its permission-based security models[C]//Proceedings of the 2011 IEEE International Conference on Electro/Information Technology. Piscataway: IEEE Press, 2011:1-6.
  • 10JIANG D Y, FU X L, SONG M Q, et al. A security assessment method for Android applications based on permission model[C]//Proceedings of the 2nd International Conference on Cloud Computing and Intelligence Systems. Piscataway: IEEE Press, 2012:701-705.

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部