期刊文献+

基于类别以及权限的Android恶意程序检测 被引量:9

Detection of malicious Android application based on permissions and category
下载PDF
导出
摘要 针对Android平台恶意软件数量的日益增多,提出一种基于类别以及权限的Android恶意程序检测方法。以Google Play划分的类为依据,统计每一个类别应用程序权限使用情况,利用应用程序的访问权限,计算该类别恶意阈值。安装应用程序时,利用序列最小优化算法给应用程序正确分类,分析应用程序使用的权限,计算该程序恶意值,与该类别的恶意阈值进行比较,给用户提供建议,帮助用户判断该程序是否是恶意的。实验结果表明了该方法的有效性和可行性。 To address the increasement of malware for Android, based on different categories and permissions of Android applications malware detection method is constructed. The method is depending on the categories in the Google Play as a reference to access permissions of applications of each category. The permissions of applications is analyzed and the malicious threshold of this category is calculated. When the application is installed, sequential minimal optimization algorithm is used to classify the application, and the permissions of the application is analyzed and the malicious value of this application is calculated. Comparing the malicious value and the category's malicious threshold, users are advised to determine the program's security. Finally, the effectiveness and feasibility of the method is verified experimentally.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第5期1568-1571,共4页 Computer Engineering and Design
基金 山西省自然科学基金项目(2009011022-2) 山西省留学基金项目(2009-28)
关键词 智能手机 安卓系统 恶意程序检测 类别 权限分析 smartphone Android system malicious detectiom category permission analysis
  • 相关文献

参考文献9

  • 1Enck W,OngTang M,McDaniel P.Understanding Android security[J].IEEE Security and Privacy,2009,7 (1):50-57.
  • 2Felt A P,Greenwood K,Wagner D.The effectiveness of application permission[C]//Proceedings of the 2nd USENIX Conference on Web Application Development.USA:USENIX Association,2011:7-7.
  • 3Enck W,Gilbert P,Chun B,et al.An information-flow tracking system for realtime privacy monitoring on smartphones[C]//Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation.USA:USENIX Association,2010:255-270.
  • 4Shahzad F,Bhatti S,Shahzad M,et al.Inexecution malware detection using task structures of Linux processes[C]//USA:Proceedings of the IEEE International Conference on Communication,2011:1-6.
  • 5Santos I,Laorden C,Bringas P G.Collective Classification for unknown malware detection[C]//USA:SECRYPT,2011:251-256.
  • 6Barrera D,Kayacik H G,Van Oorschot P C,et al.A methodology for empirical analysis of permission-based security models and its application to android[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security.USA:ACM,2010:73-84.
  • 7Nauman M,Khan S,Zhang X.ExtenAing android permission model and enforcement with user defined runtime constraints[C]//Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.USA:ACM,2010:328-332.
  • 8Batyuk L,Herpich M,Camtepe S A,et al.Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications[C]//Malicious and Unwanted Software (MALWARE),USA:IEEE,2011:66-72.
  • 9Sanz B,Santos I,Laorden C,et al.Permission usage to detect Malware in android[C]//International Joint Conference CISIS' 12-ICEUTE' 12-SOCO' 12 Special Seesions,2013:289-298.

同被引文献60

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2IDC, Smartphone OS market share, 042014 [ R/OLI. 2014. http ://www. idc. com/prodserv/smartphone-os-market-share, jsp.
  • 3Svajcer V. Sophos mobile security threat report[R/OL]. 2014. http://www, sophos, com/en - us/medialibrary/PDFs/ other/sophos-mobilesecurity-threat -report. ashx.
  • 4Barrera D, Kayacik H. A methodology for empirical analysis of permission-based security models and its application to an- droid[ C]//Proceedings of the 17th ACM conference on com- puter and communications security. [ s. 1. ] : ACM, 2010 : 73 - 84.
  • 5Finickel E, Lahmadi A. Empirical analysis of Android logs u- sing self-organizing maps[ C]//Proc of IEEE international conference on communications. [ s. 1. ] : IEEE, 2014:1802 - 1807.
  • 6Zhou Yajin, Jiang Xuxian. Dissecting Android malware:char- acterization and evolution [ C ]//Proc of IEEE symposium on security and privacy. San Francisco ~ CA : IEEE, 2012 : 95 - 109.
  • 7Kohonen T. Self- organizing maps [ M ]. 3rd ed. [ s. 1. ] : Springer ,2001.
  • 8Smartphone OS sales market share[ EB/OL]. (2015 - 3 - 7 ) http:// www. kantarworldpanel, eom/global/smartphone-os-market-share/.
  • 9Android ,the world' s most popular mobile plafforol[ EB/OL]. (2015 - 4 -22) http://developer, android, com/about/index, html.
  • 102014年第一季度网秦全球手机安全报告[EB/OL].(2014-5-28)http://s1.nq.corn/file/ennq/download/2014Q1.pdf.

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部