期刊文献+

基于Dalvik指令的Android应用检测方法

Android malware detection based on Dalvik instructions
下载PDF
导出
摘要 为提高Android移动平台的安全性,提出一种基于Dalvik指令的静态检测方法,通过分析应用程序的虚拟机代码,找出敏感信息的数据流,包括跟踪敏感信息、函数的调用,从而判断出该应用程序是否有恶意行为。用上述方法建立系统模型来验证其有效性,最终实验结果表明此方法既避免了检测方法的滞后性,又能有效的检测出恶意软件。 In order to improve the security of the Android platform, a method using Dalvik instructions is proposed. Through analyzing Dalvik instructions of the Android software, the data flow of sensitive information can be described, including the tracking of sensitive variables and call functions. Finally, the current software will be tested whether it has malicious behaviors. A system model has been made to validate the method, and the experimental results show that this method can effectively detect malware in real time.
作者 白鸽 钱步仁
出处 《电子设计工程》 2016年第5期32-34,共3页 Electronic Design Engineering
关键词 ANDROID 行为检测 数据流 Dalvik指令 Android behavior detection data flow Dalvik instructions
  • 相关文献

参考文献7

二级参考文献54

  • 1左强,郝玉洁,刘乃琦.基于Symbian的智能手机防火墙研究与设计[J].微计算机信息,2008,24(9):39-41. 被引量:2
  • 2陈雅娴,袁津生,郭敏哲.基于行为异常的Symbian蠕虫病毒检测方法[J].计算机系统应用,2008,17(11):49-52. 被引量:5
  • 3潘娟.移动终端的信息安全.2009信息通信网技术业务发展研讨会.2009:94-99.
  • 4Pavone M. Dex File Format. http://www.retrodev.com/ android/dexformat.html. 2011,12.
  • 5移动终端白皮书(2012年1.http://www.cttl.cn/txyy/ggl/201204/P020120413505417116578.pdf.
  • 62012年第三季度全球手机安全报告.http://cn.nq.com/neirong/2012Q3.pdf.
  • 7Zhou Y J, Wang Z, Zhou W, Jiang XX. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. Proc. of the 19th Network and Distributed System Security Symposium(NDSS 2012). San Diego, CA, February 2012.
  • 8Enck W, Gilbert P, Chun B, Cox LP, Jung J, McDaniel P, Sheth AN. Taint Droid: an information-flow tracking system for realtime privacy monitoring on smartphones Proc. of the 9th USENIX. Vancouver, BC, Canada. 2010: 1-6. Gilbert P, Chun B Cox LP, Jung J. Vision: Automated Security Validation of Mobile Apps at App Markets. Proc. of the International Workshop on Mobile Cloud Computing and Services. USA: ACM. 2011: 21-26.
  • 9Chess B, McGraw Ct Static analysis for security. IEEE Security and Privacy, 2004, 2(6): 76-79.
  • 10Cheng S, Yang J, Wang J, Wang J, Jiang E Loongchecker: Practical summary-based semi-simulation to detect vulnerability in binary code. Proc. 10th Int. Conf. on Trust Security and Privacy in Computing ana Communications. IEEE, 2011: 150-159.

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部