期刊文献+

基于Android系统的应用软件动态行为分析技术浅析 被引量:3

Research on Dynamic Behavior Analysis of Application Software Based on Android System
下载PDF
导出
摘要 介绍了传统软件动态行为分析技术的原理和发展现状,并研究了动态分析技术在基于Android系统的应用软件安全检测中的应用,通过具体实例说明了动态行为分析技术在解决Android应用安全检测方面发挥的重要作用。 In recent years, with the rapid development of mobile Internet, mobile smart terminals become an indispensable part of people's life. Subsequently, the security threat of mobile smart terminals is becoming more serious than ever before. The principle and development status of traditional software's dynamic behavior analysis technology were introduced. The applications of dynamic behavior analysis technology in application software security detection based on Android system were analyzed, With specific cases, the important role of dynamic behavior analysis technology in Android based application security detection was elaborated.
出处 《移动通信》 2015年第11期23-29,共7页 Mobile Communications
关键词 软件行为 Android应用安全检测 动态行为分析技术 software behavior Android application security testing dynamic behavior analysis technology
  • 相关文献

参考文献6

  • 1Ariel. App Stores Growth Accelerates in 2014[EB/OL]. (2015-01 - 13). http://blog.appfigures.com/app-stores- growth-accelerates-in-2014/.
  • 2John Hoopes, Aaron Bawco, Fred Shore, et al.虚拟安全-沙盒、灾备、高可用性、取证分析和蜜罐[M].杨谦,谢志强,译.北京:科学出版社,2010.
  • 3JeffreyRichter.Windows核心编程(原书第冈版)[M].黄陇,李虎,译.北京:机械工业出版社,2008.
  • 4李闻,戴英侠,连一峰,冯萍慧.基于混杂模型的上下文相关主机入侵检测系统[J].软件学报,2009,20(1):138-151. 被引量:31
  • 5Abhijit Bose, Xin Hu, Kang G Shin, et al. Behavioral Detection of Malware on Mobile Handsets[C]. Proceeding of International Conference on Mobile System Applications & Services, New York: ACM, 2008: 225- 238.
  • 6DrewConway,JohnMylesWhite.机器学习:安用案例解析[M].陈开江,刘逸哲,孟晓楠,译.北京:机械工业出版社,2008.

二级参考文献16

  • 1Denning D. An intrusion detection model. IEEE Trans. on Software Engineering, 1987,13(2):222-232.
  • 2Forrest S. A sense of self for UNIX processes. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 1996. 120-128. http://www.cs.unm.edu/-forrest/publications/ieee-sp-96-unix.pdf
  • 3Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180.
  • 4Helman P, Bhangoo J. A statistically based system for prioritizing information exploration under uncertainty. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans, 1997,27(4):449466.
  • 5Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proc. of the 7th USENIX Security Syrup. San Antonio, 1998. 26-40. http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee.pdf
  • 6Lee W, Stolfo SJ, Chan PK. Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. AAAI Press, 1997. 50-56. http://www.cc.gatech.edu/-wenke/papers/ osid paper.ps
  • 7Sekar R, Bcndre M, Bollineni P, Dhurjati D. A fast Automaton-Based method for detecting anomalous program behaviors. In: IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 144-155. http://www.cc.gatech.cdu/-wcnkc/ids-readings/automaton. pdf
  • 8Feng HH, Kolesnikov OM, Fogla P, Lee W, Gong W. Anomaly detection using call stack information. In: Proc. of the 2003 IEEE Syrup. on Security and Privacy. Oakland: IEEE Press, 2003.62-75. http://www-unix.ecs.umass.edu/-gong/papers/ok_idpc.pdf
  • 9Wagner D, Dean D. Intrusion detection via static analysis. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland: IEEE Press, 2001. 156-168. http://www.csl.sri.com/users/ddean/papers/oakland01.pdf
  • 10Giffin J, Jha S, Miller B. Detecting manipulated remote call streams. In: Proc. of the 11th USENIX Security Symp. San Francisco: 2002.61-79. http://www.cs.wise.edu/wisa/papers/security02/gjm02.pdf

共引文献30

同被引文献19

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部