期刊文献+

基于多层次交叉视图分析的Android系统恶意行为监控方法研究

Research on Method of Android System Malware Behavior Monitoring Based on Multi-level and Cross-view Analysis
下载PDF
导出
摘要 现有的Android系统行为监控方法,或需重新编译系统,或需改动被监控软件,且大多数监控不全面,无法识别恶意代码隐藏行为。针对这些问题,文章提出了一种基于多层次交叉视图分析的Android系统恶意行为监控方法。该方法基于进程注入和可加载内核模块技术,在Java层、Native层和Kernel层对恶意行为进行监控,获取行为监控表,并通过交叉视图对比分析,识别恶意代码的隐藏行为。最后,文章在Android模拟器环境下,利用能够覆盖主要恶意行为的12种恶意代码进行实验,结果表明,该方法对恶意行为的监控准确率达到了91.43%,并能有效检测其隐藏行为,监控粒度细、实用性强。 The existing methods applying to behavior monitoring of Android system need to either recompile the system or alter the applications which is monitored. Most of them are not comprehensive enough and cannot identify the hidden behaviors of malicious codes. According to the problems raised before, this paper proposes a method of Android system malware behavior monitoring which bases on multi-level and cross-view analysis. The paper uses the technology of process injection and loadable kernel, which monitors malware behavior in Java level, Native level and Kernel level. Then this paper obtains the result of behavior monitoring and identiifes the hidden behaviors by cross-view analysis. Under Android simulator environment, the experiment uses 12 kinds of malware which can cover most of the malware behaviors. The results shows that the monitoring accuracy rate of malicious behavior reaches to 91.43%, and the method can detect the hidden behaviors effectively. So it has fine audit granularity and strong practicality.
出处 《信息网络安全》 2016年第7期40-46,共7页 Netinfo Security
基金 国家242信息安全计划[2005C48]
关键词 ANDROID系统 行为监控 交叉视图 Android system behavior monitoring cross-view
  • 相关文献

参考文献3

二级参考文献48

  • 1张和君,张跃.Linux动态链接机制研究及应用[J].计算机工程,2006,32(22):64-66. 被引量:10
  • 2Schmidt A D, Schmidt H G, Clausen J, et al. Enhancing secu- rity of Linux-based Android devices [EB/OL]. [2011- 1 1-19]. http://ww~.dai-labor.de/fileadmin/files/publica tions/lk2OO8- android security.pdf.
  • 3Burguera L, Urko Z, Simin N. Crowdroid: behavior-based malware detection system for Android [C]//Proc 1st ACM Workshop on Security and Privacy in Smartphones and Mo- bile Devices. New York: ACM Press, 2011: 15-26.
  • 4Manuel E, Theodoor S, Engin K, et al. A survey on auto- mated dynamic malware analysis techniques and tools [J]. ACMComputing Surveys, 2012, 44(2): 1-49.
  • 5Wikipedia. Inter-process communication [EB/OL]. [2012-01- 07] http://en, wikipedia.org/wiki/Inter-proeess_communication.
  • 6Schreibe T. Android binder [EB/OL]. [2012-03-29]. http://www. nds.rub.de/media/attachments/files/2012/O3/binder.pdf.
  • 7Xfocus Team. Injecting shared library [EB/OL]. [2011-12- 14]. http://www.focus.net/articles/200208/438.html.
  • 8TIS Committee. Executable and linkable format [EB/OL]. [2011-10-30]. http://www.skyfree.org/linux/references/ELF_F ormat.pdf.
  • 9Anonymous. Runtime process infection [EB/OL]. [2011-12- 05]. http ://www.phrack. org/issues.html ?issue= 5 9 & id=8.
  • 10Li T S, Jing S, Xu J H, et al. The research of dalvik virtual machine on the Android platform[C]//Proe 3rd International Conf on Manufacturing Science and Engineering, Xiamen: IEEE Press, 2012:2534-2537.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部