期刊文献+

安卓恶意软件的分析与检测 被引量:4

Detection and Analysis of Android Malware
下载PDF
导出
摘要 为了充分说明安卓(Android)恶意软件的工作原理,分析并降低其威胁性,本文利用Android的安全机制缺陷和Service、Broadcast两个组件实现了一个隐私窃取软件。阐述了使用Android逆向工程技术完成恶意代码植入的方法。基于云安全技术和信息比对算法,设计出一个恶意软件静态检测方案,能够有效地在源码级完成恶意软件的检测工作。 In order to describe the working principle of Android malware,analyze and reduce its threat,a privacy stolen malware was realized first by use of the security flaws of Android,Service and Broadcast. The method of implanting malicious code was introduced by using the Android reverse engineering technology. Then a malware static detection scheme was designed with the cloud security technology and information contrast algorithm. The malware based on the source code is dectected.
出处 《河南科技大学学报(自然科学版)》 CAS 北大核心 2015年第5期52-56,7,共5页 Journal of Henan University of Science And Technology:Natural Science
基金 国家自然科学基金项目(61303263)
关键词 安卓 安全机制缺陷 恶意软件 逆向工程 静态检测 Android security mechanism flaws malware reverse engineering static detection
  • 相关文献

参考文献1

共引文献1

同被引文献23

  • 1FEIZOLLAH A, ANUAR N, SALLEH R, et al. A study of machine learning classifiers for anomaly-based mobile botnet detection[J]. Malaysian Journal of Computer Science, 2013, 26(4):251-265.
  • 2360互联网安全中心.2014年第三期中国手机安全报告[EB/OL].[2015~0319].http://zt.360.cn/1101061855.phpdtid=1101061451g>did=1101062591.
  • 3ZHOU Y, WANG Z, ZHOU W, et al. Hey, you, get off my market: Detecting malicious apps in official and alternative Android markets[J]. In Proceedings of the 19th Annual Network ~> Distributed System Security Symposium, 2012(2) : 352-365.
  • 4TEUFL P, KRAXBERGER S, ORTHACKER C, et al. Android market analysis with activation patterns[J]. In MOBISEC, 2012,94 : 1-12.
  • 5BARRERA D, KAYACIK H G, VAN (X)RSCHOT P C, et al. A methodology for empirical analysis of permission based security models and its application to android[C]// In Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, USA, 2010.. 73 84.
  • 6FUCHS A, CHAUDHURI A, FOSTER J. Scan droid: automated security certification of Android applications[C],~~ Technical Report, University of Maryland, 2009.
  • 7GRACE M C, ZHOU Y, ZHANG Q, et al. Risk ranker: scalable and accurate zero-day Android malware detection[C]//International Conference on Mobile Systems, 2012: 281-294.
  • 8FENG Y, ANAND S, DILLIG I, et al. Apposcopy: semantics based detection of android malware[C]// Report University of Texas at Austin, 2013.
  • 9I.IU L, YAN G H, ZHANG X W, et al. Virus meter., preventing your cellphone from spies[J]. Lecture Notes in Computer Science, 2009, 57 : 244 264.
  • 10. ZHANG Y, YANG M, XU B, etal. Vetting undesirable behaviors in Android apps with permission use analysisEC~//Proceedings of the 2013 ACM SIGSAC conference on Computer ~ Communications Security, ACM, 2013, 9:611-622.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部