期刊文献+

Android智能手机安全隐患分析及解决对策 被引量:2

Analysis and Solutions of Android Intelligent Mobile Phone's Safety Hidden
下载PDF
导出
摘要 智能手机由于其内置嵌入式操作系统,用户可以自由下载和安装软件,其安全问题更加突出。主要表现在易被植入病毒或恶意代码造成用户信息泄露、被远程操控对网络发起攻击,易被植入或被捆绑吸费软件造成用户额外支付费用等。通过对安卓(Android)智能手机的安全机制进行分析,找出目前存在的安全隐患及原因,并提出相应的解决对策。 Since intelligent mobile phone has built-in embedded operating system, users can freely download and install software, as a result of its security issues become more prominent. The main manifestations include implanted virus or mali- cious code that make users' information leakage, operated remotely to attacks on network, easy to be implanted or bundled software that cause the user pay additional suction fee. In this paper, through analyzing the Android intelligent mobile phone security mechanism, find out the hidden security risks and reasons, also puts forward the corresponding
作者 赵静
出处 《电脑编程技巧与维护》 2014年第18期102-103,110,共3页 Computer Programming Skills & Maintenance
关键词 智能手机 ANDROID操作系统 安全隐患 intelligent mobile phone Android system security risks
  • 相关文献

参考文献7

二级参考文献19

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google android:a comprehensive security assessment. IEEE Security & Privacy, 2010.
  • 2符易阳周丹平.Android安全机制分析.第26次全国计算机安全学术交流会论文集.2011.
  • 3期廖明华,郑力明.Android安全机制分析与解决方案初探.科学技术与工程,2009,26(11):6351-6354.
  • 4Enck W,Ongtang M,McDaniel P. Understanding android security. IEEE Security & Piracy, 2009,7(1):53-54.
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly:a behavioral malware detection framework for Android devices. Intelligent Information Systems,2011.
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto malicious behavior in mobile devices: knowledge- based approach.RAID, 2009.
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion detection on mobile devices using the knowledge based temporal-abstraction method. Systems and Software,2010,83(8):l 527-1 536.
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for inferring computer and network security alerts from timestamped,rawsystem metrics. Computer Virology, 2009,8 (3): 267-298.
  • 9Davi L, Dmitrienko A, Sadeghi A-R, et al. Privilege escalation attacks on Android. Proceedings of the 13th Information Security Conference (ISC),2010.
  • 10Enck W, Ongtang M, McDaniel P. Mitigating android software misuse before it happens. Technical Report NAS-TR-0094-2008, Pennsylvania State University, 2008.

共引文献35

同被引文献7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部