期刊文献+

安卓应用系统的功能与权限相关性研究 被引量:15

ON RELATIONSHIP OF FUNCTIONS AND PERMISSIONS IN ANDROID APPLICATIONS
下载PDF
导出
摘要 安卓系统是世界上最流行的智能终端系统之一。随着安卓用户的与日俱增,其市场占有率迅速扩大,并出现了大量的安卓应用软件。为应对安卓应用市场中出现的恶意软件,保障用户手机系统安全,安卓系统采用基于权限的安全机制,要求安卓应用事先声明其所用到的系统权限。探索研究安卓应用功能与安卓系统权限之间的关系,通过获取互联网上安卓应用市场的大量数据,利用信息检索和语义分析等技术分析安卓应用的功能描述及目前安卓版本声明的权限之间的语义关系,并得到关系模型。该模型可用于进一步研究安卓应用权限声明的合理性与安全性,为应用市场和用户进行应用可信度评价提供支持。 android system is one of the most popular intelligent terminal operating systems in the world. With users number growing quickly, its market sharing expands rapidly as well, and a great deal of android applications is available. In response to malicious software in android applications market and safeguarding the system security of users’ mobile phones, android system uses the permission-based security mechanism and demands its applications declaring the system permissions used in advance. In this paper, we explore and study the relationship between the applications function and the system permissions of android. After gathering massive amount of data from internet in regard to android applications market, we analyse the semantic relationship between the function description of android applications and the permission declared by current android system using the technologies of information retrieval and semantic analysis, and finally get a relationship model. This model can be used for future studying the rationality and security of the permission declaration in android applications, and provides the application market and android users with supports for application credibility assessment.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第10期27-33,共7页 Computer Applications and Software
关键词 安卓应用 权限 LSI TF-IDF 向量空间模型 Android application Permission LSI TF-IDF Vector space model
  • 相关文献

参考文献14

  • 1Android ( operating system ) [ EB/OL] . [ 2012 - 12 -06] http://en.wikipedia. org/wiki/Android_( operating_system ).
  • 2Gartner. Gartner says android to command nearly half of worldwide smar-tphone operating system market by year-end 2012 [ EB/OL]. [2012-12-18]. http://www. gartner. com/newsroom/id/1622614, April 2011.
  • 3Kellogg D. In U. S. Market, New Smartphone Buyers Increasingly Em-bracing Android [ R/OL]. [ 2012 - 12 -18]. http://blog, nielsen.com/nielsenwire/online 一 mobile/in-u-s-market-new-smartphone-buy-ers-increasingly-embracing-android/. 2011.
  • 4Malicious Mobile Threats Report 2010/2011, White paper, Juniper Net-works Global Threat Center Research [ R/OL ]. [ 2012 - 12 - 19]. ht-tp ://www. juniper, net/us/en/local/pdf/whitepapers/2000415 -en. pdf.
  • 5Kiyomoto S, Fukushima K,Tanaka T. A Formal Model to Analyze thePermission Authorization and Enforcement in the Android Framework[C ]//Second International Conference on Social Computing ( Social-Com) ,2010:944-951.
  • 6Au K,Zhou B,Huang Z,et ai. Short Paper: A Look at SmartPhone Per-mission Models [ C ] //Proceedings of the ACM Workshop on Securityand Privacy in Mobile Devices (SPSM) ,2011.
  • 7Zhaohui Wang, Gagnon C, Stavrou A. Analysis of Android Applica-tions * Permissions [ C ]//Sixth International Conference on SoftwareSecurity and Reliability Companion ( SERE-C),2012:45 - 46.
  • 8Csfahani N,Kacem T, Mahmood R,et al. A Framework for AutomatedSecurity Testing of Android Applications on the Cloud [ C ] //Sixth In-ternational Conference on Software Security and Reliability Companion(SERE-C) ,2012:35-36.
  • 9Rassameeroj I, Tanahashi Y. Various approaches in analyzing Androidapplications with its permission-based security models [ C ]//Interna-tional Conference on Electro/Information Technology ( EIT) , 2011 : 1-6.
  • 10Radev D R, Hatzivassiloglou V, McKeown K R. A description of the CI-DR system as used for TDT-2 [ C ] //DARPA broadcast news workshop.Hemdon,V irginia, 1999.

同被引文献114

引证文献15

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部