期刊文献+

Android本地恶意应用鉴别系统的实现

Android Native Code Malware Detection System
下载PDF
导出
摘要 近年来,Android手机由于其出色的用户体验,吸引了大量的用户,同时也因为它的开源特性,也极易受到恶意软件的攻击,其中本地恶意软件尤为恶劣。论文针对Android平台上本地恶意应用软件,提出了基于代码基本块控制流比较的鉴别方法。通过代码中基本块的分离,控制流图的构造及其信息的抽象比较,设计实现了一套Android平台上本地代码恶意应用鉴别系统。 In recent years,Android smart phone attracts many users owing to its brilliant user experience.Meanwhile,it's vulnerable to malware because of its open-source characteristic,especially native code.A method was proposed to detect native malware based on the comparison of control flow graph of basic blocks.By the separation of basic blockscode,the construction of control flow graph and the comparison of the abstract of it,a detection system is designed and implemented that can identify native malware on Android platform.
作者 廖元之
机构地区 南京邮电大学
出处 《信息安全与技术》 2016年第4期56-60,共5页
基金 江苏省大学生科技创新训练计划(stitp)资助(项目编号:SZD2015008)
关键词 安卓 本地代码 控制流图 android native code control flowgraph
  • 相关文献

参考文献10

  • 1Chang Choi,Xuefeng Piao,Junho Choi,Mungyu Lee,Pankoo Kim.Malicious behavior pattern mining using control flow graph. RACS Proceedings of the 2015 Conference on research in adaptive and convergent systems . 2015
  • 2Zhenlong Yuan,Yongqiang Lu,Yibo Xue.Droid Detector:Android Malware Characterization and Detection Using Deep Learning[J].Tsinghua Science and Technology,2016,21(1):114-123. 被引量:37
  • 3Mc Afee Labs.Mc Afee Labs Threats Report. Http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf . 2015
  • 4Fedler R,Kulicke M,Schütte J.Native code execution control for attack mitigation on android. Proceedings of the Third ACM workshop on Security and privacy in smartphones&mobile devices . 2013
  • 5Market Share Statistics for Internet Technologies. http://www.netmarketshare.com/ .
  • 6Mengtao Sun,Gang Tan.Native Guard:protecting android applications from third-party native libraries. Wi Sec’’14:Proceedings of the 2014 ACM conference on Security and privacy in wireless&mobile networks . 2014
  • 7窦增杰,王震宇,陈楠,王瑞敏,田佳.基于可执行代码中间表示的控制流分析[J].计算机工程,2010,36(21):31-33. 被引量:2
  • 8周博,蒋烈辉,费勤福.汇编子程序流程图绘制算法研究[J].计算机应用与软件,2007,24(1):160-161. 被引量:6
  • 9Android Mal Share. http://andromalshare.androidmalware.org:8080/#home .
  • 10S.S.Anju,P.Harmya,Noopa Jagadeesh,R.Darsana.Malware detection using assembly code and control flow graph optimization. A2CWi C’’10:Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India . 2010

二级参考文献41

  • 1周博,蒋烈辉,费勤福.汇编子程序流程图绘制算法研究[J].计算机应用与软件,2007,24(1):160-161. 被引量:6
  • 2Muchnick S S.Advanced Compiler Design and Implementation[M].[S.l.]: Academic Press,1997: 123-157.
  • 3Aho A V,Lam M S,Sethi R,et al.编译原理[M].陈火旺,刘春林,谭庆平,等,译.北京: 机械工业出版社,2009.
  • 4Nielson F,Nielson H R,Hankin C.Principles of Program Analysis[M].[S.l.]: Springer-Verlag,1999.
  • 5W.C.Hsieh,D.Engler,and G.Back.Reverse-Engineering Instruction Encodings[A].In USENIX Annual Technical Conference[C],pp.133~146,Boston,Mass.,June 2001.
  • 6Benjamin Schwarz,Saumya Debray,Gregory Andrews,Disassembly of executable code revisited[R],Working Conference on Reverse Engineering,Oct 2002.
  • 7C.Cifuentes and K.Gough.Decompilation of Binary Programs[J],Software Practice & Experience,July 1995,25(7):811~829.
  • 8Gartner, Gartner says Android has surpassed a billion shipments of devices, http://www.gartner.com/ newsroongid/2954317, 2015.
  • 9T. Vidas, D. Votipka, and N. Christin, All your droid are belong to us: A survey of current Android attacks, inProceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81-90.
  • 10A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3-14.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部