期刊文献+

基于Fuzzy-IBE的Android防恶意代码注入方案

An Android anti-malware injection scheme based on Fuzzy-IBE
下载PDF
导出
摘要 为了防范Android恶意代码的注入,提升APK的安全性,抵御对其认证文件的碰撞攻击,基于Fuzzy-IBE设计了一种Android防恶意代码注入方案。该方案利用APK自身的多个资源文件作为APK的属性信息,并将属性进行Hash处理,映射为Fuzzy-IBE的解密私钥,防止了恶意攻击者对APK的注入,同时优化了应用程序的内部结构,减少了应用的体积。实验结果表明,该方案对于防止恶意代码注入是有效的。 In order to prevent the injection of Android malicious code, improve the security of APK and resist the impact of the authentication file, An Android anti-malware injection scheme based on fuzzy-IBE is designed, the scheme uses APK's own multiple resource file as APK attribute information, the property is processed by Hash and mapped into Fuzzy-IBE de'- cryption key for preventing the application of malicious attackers effectively. The internal structure of the application is opti mized, the size of the application is reduced. The experimental results show that the scheme is effective for anti-malware in jection.
出处 《桂林电子科技大学学报》 2016年第1期39-43,共5页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61272037 61402366 61472472) 陕西省自然科学基础研究计划(2013JZ020 2015JQ6236) 陕西省教育厅科研计划(15JK1686) 西安邮电大学研究生创新基金(CXL2014-04)
关键词 智能移动端 Fuzzy-IBE ANDROID 恶意代码注入 Android签名 mobile intelligent terminal Fuzzy-IBE Android malware injection digital signature of Android
  • 相关文献

参考文献11

二级参考文献43

  • 1黄月江,祝世雄.信息安全与保密[M].北京:国防工业出版社,2008:141-170.
  • 2ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 3STALLINGS W.Cryptography and network security:principles and practices[M].4th ed.Beijing:Publishing House of Electronics Indusutry,2006:334-358.
  • 4施峰,胡昌报,刘炳华.信息安全保密[M].北京:北京理工大学出版社,2007:239-258.
  • 5BELLARE M,KOHNO T.Hash function balance and its impact on birthday attacks[C]//EUROCRYPT 04.Berlin:Springer-Vedag,2004:401-418.
  • 6YUVAL G.How to swindle Rabin[M].California:Cryptoiogia,1979:273-285.
  • 7SHAI H.HUGO K.Stmagthening digital signatures via randomized hashing[C]//Cryptology-CRYPTO 2006.California:Springer-Vedag,2006:41-59.
  • 8Kocher E Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems[C]//Proc. of CRYPTOLOGY'96. Berlin, Germany: Springer-Verlag, 1996.
  • 9Dhem J F, Koeune K, Leroux P A, et al. A Practical Implemen- tation of the Timing Attack[C]//Proc. of CARDIS'98. Toulouse, France: [s. n.], 1998.
  • 10Intel Corporation. Using the RDSTC Instruction for Performance Monitoring[Z]. 1997.

共引文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部