期刊文献+

基于Android签名及敏感权限分组的安全检测系统 被引量:3

A safety detection system based on Android signature and sensitive grouping permissions
下载PDF
导出
摘要 基于Android的系统架构和安全机制,设计并实现了用于检测手机恶意应用App的系统.此系统通过对Android应用程序APK文件的签名及敏感权限分组的检测,有效判定恶意应用意图,排除安全隐患,从而保护用户权益. Based on the most popular system architecture and security mechanisms of Android mobile phone system, a system has been designed and implemented for detecting malicious applications app for mobile phones. Through the detection of signatures and sensitive grouped permissions for Android applications APK files, this system can effective- ly determine the intention of malicious applications ,eliminate security risks ,and protect the interests of consumers.
出处 《云南民族大学学报(自然科学版)》 CAS 2015年第5期418-421,共4页 Journal of Yunnan Minzu University:Natural Sciences Edition
基金 国家自然科学基金(61463050) 云南省教育厅科学研究基金(2014Y003)
关键词 ANDROID APK 安全机制 签名 敏感权限分组 Android APK security mechanisms signatures sensitive grouped permissions
  • 相关文献

参考文献5

二级参考文献24

  • 1Nauman M,Khan S,Zhang X. Apex: extending android permission model and enforcement with user-defined runtime constraints[C]. 2010:328-332.
  • 2吴俊昌,骆培杰,程绍银,等.基于权限分类的Android应用程序的静态分析[c]//第四届信息安全漏洞分析与风险评估大会.北京,2011:61-71.
  • 3Shabtai U, Kanonov,Elovici Y, et al. Andromaly: a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems,2012:l-30.
  • 4Shabtai U, Kanonov Y, Elovici. Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach[C]. 2009:357-358.
  • 5Habtai U,Kanonov Y,Elovici. Intrusion detection for mobile devices using the knowledge-based ,temporal abstraction method [J]. Journal of Systems and Software, 201 O, 83 (8): 1524-1537.
  • 6Shabtai Y,Fledel Y,Elovici,et al. Using the KBTA method for inferring computer and network security alerts from time- stamped, raw system metrics[J]. Journal in Computer Virology, 2010,6(3 ):239.
  • 7McMee Labs. McMee Q3 2011 Threats Report Shows 2011 on Target to Be the Busiest in Mobile Malware History[ EB/OL]. [2012-06-20]. http:// cn. reuters, com/article/pressRelease/idUS117347 + 21 - Nov - 2011 + BW201111217 symbol =INTC. O.
  • 8金泰延,宋亨周,朴知勋,等.Android框架揭秘[M].北京:人民邮电出版社,2012.
  • 9ENCK W, ONGTANG M, MCDANIEL P. Understanding Android security [ J ]. IEEE Security & Privacy,2009,7 ( 1 ) :53-54.
  • 10SHABTAI A, FLEDEK Y, KANONOV U, et al. Google Android: a compre- hensive security assessment[J]. IEEE Security & Privacy,2010:35-38.

共引文献65

同被引文献15

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部