期刊文献+

基于多级签名匹配算法的Android恶意应用检测 被引量:12

Android malware detection based on multi-level signature matching
下载PDF
导出
摘要 针对Android恶意应用泛滥的问题,提出了一种基于恶意应用样本库的多级签名匹配算法来进行Android恶意应用的检测。以MD5哈希算法与反编译生成的smali文件为基础,生成API签名、Method签名、Class签名、APK签名。利用生成的签名信息,从每一类恶意应用样本库中提取出这类恶意行为的共有签名,通过匹配待检测应用的Class签名与已知恶意应用样本库的签名,将待测应用中含有与恶意签名的列为可疑应用,并回溯定位其恶意代码,确定其是否含有恶意行为。在测试中成功地发现可疑应用并定位了恶意代码,证明了系统的有效性。 This paper proposed an Android malware analytic method based on improved multi-level signature. It combined decompiling techniques with MD5 hash function,generating API signature,method signature,class signature,and the application signature. After getting the signature,it extracted the same mal-signatures of one kind malware in the malware repository successfully. Then used the information of mal-signature to detect other applications. Finally it was necessary to locate and analyze the main mal code of those suspecte applications. And the experiments to real Android applications indicated that this system can find the suspected applications and locate the malicious code.
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期891-895,共5页 Application Research of Computers
基金 信息网络安全公安部重点实验室开放课题项目(C13611) 东南大学基于教师科研的SRTP项目(ZN2013080157)
关键词 多级签名 恶意应用 安卓 匹配 检测 multi-level signature malware Android match detect
  • 相关文献

参考文献15

  • 1贾菲,刘威.基于Android平台恶意代码逆向分析技术的研究[J].信息网络安全,2012(4):61-63. 被引量:20
  • 2胡文君,赵双,陶敬,马小博,陈亮.一种针对Android平台恶意代码的检测方法及系统实现[J].西安交通大学学报,2013,47(10):37-43. 被引量:21
  • 3李寅,范明钰,王光卫.基于反编译的Android平台恶意代码静态分析[J].计算机系统应用,2012,21(11):187-189. 被引量:12
  • 4Andreas M, Christopher K, Engin K. Limits of static analysis for malware detection[C] //Proc of the 23rd Annual Computer Security Applications Conference. 2007.
  • 5秦中元,徐毓青,梁彪,张群芳,黄杰.一种Android平台恶意软件静态检测方法[J].东南大学学报(自然科学版),2013,43(6):1162-1167. 被引量:11
  • 6Zheng Min, Sun Mingshen, Lui J C S. DroidAnalytics:a signature based analytic system to collect, extract, analyze and associate android malware[C] //Proc of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2013.
  • 7Alazab M, Moonsamy V, Batten L, et al. Analysis of malicious andbenign Android applications[ C ]//Proc of the 32nd International Con- ference on Distributed Computing Systems Workshops. 2012: 608- 616.
  • 8Enck W, Gilbert P, Han S, et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C] //Proc of the 9th USENIX Symposium on Operating Systems Design and Implementation. 2010.
  • 9Burguera I, Zurutuza U, Nadjm-Tehrani S. CrowDroid:behavior-based malware detection system for Android[C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. 2011.
  • 10Zhou Yajin, Jiang Xuxian. Dissecting Android malware:characterization and evolution[C] //Proc of the 33rd IEEE Symposium on Security and Privacy. 2012.

二级参考文献44

  • 1左强,郝玉洁,刘乃琦.基于Symbian的智能手机防火墙研究与设计[J].微计算机信息,2008,24(9):39-41. 被引量:2
  • 2陈雅娴,袁津生,郭敏哲.基于行为异常的Symbian蠕虫病毒检测方法[J].计算机系统应用,2008,17(11):49-52. 被引量:5
  • 3潘娟.移动终端的信息安全.2009信息通信网技术业务发展研讨会.2009:94-99.
  • 4Pavone M. Dex File Format. http://www.retrodev.com/ android/dexformat.html. 2011,12.
  • 5Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 6Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 7Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 8Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 9Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 10Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.

共引文献77

同被引文献75

引证文献12

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部