期刊文献+

面向移动系统安全的应用分析技术综述 被引量:2

Review of Application and Analysis Techniques for Mobile System Security
下载PDF
导出
摘要 随着移动设备越来越普及,针对移动系统的恶意软件也越来越多.为了保障用户的隐私和财产安全,国内外的专家学者针对现有的移动系统应用安全问题提出了许许多多的解决方案.介绍了当前主流的移动操作系统,并且对于近年来面向这些系统的应用安全分析技术进行了全面的分析和讨论.在此基础上,对于未来移动系统应用安全分析技术的发展方向进行了展望和总结. The popularity of mobile system has attracted malware developers. To ensure the security of users' privacy and property, there has been numerous solutions targeting current security issues of mobile system. In this paper, it introduces the prevalent mobile operating systems and the mobile application security analysis methodologies. In addition, it makes analysis and discussion. At last, it proposes the prospects of possible directions of mobile application analysis approaches and endswith a conclusion.
出处 《计算机系统应用》 2016年第9期17-26,共10页 Computer Systems & Applications
基金 国家自然科学基金(61370081) 国家高技术研究发展计划(863)(2012AA010905)
关键词 移动系统 安全 应用 分析 mobile system security application analysis
  • 相关文献

参考文献33

  • 1Ericsson. Ericsson Mobility Report. http://www.ericsson.com/res/docs/2015/mobility-report/ericsson-mobility-report-nov-2015.pdf. [2015-10-03].
  • 2Mike Murray. BSides Las Vegas: Your Droid Has No Clothes.http://blog.trustlook.com/2013/08/05/bsides-las-vegas-your-droid-has-no-clothes/. [2013-08-05].
  • 3Li Q, Clark G Mobile security: A look ahead. Security &Privacy, IEEE, 2013,11(1): 78-81.
  • 4Statista. Smartphone OS worldwide by installed base in 2014(inmillions), http://www.statista.com/statistics/385001/smartphone-worldwide-installed-base-operating-systems/. [2015-12-17].
  • 5Ingraham N. Apple’s App Store has passed 100 billion appdownloads, http://www.theverge.com/2015/6/8/8739611/apple-wwdc-2015-stats-update. [2015-06-08].
  • 6Xing L, Pan X,Wang R, et al. Upgrading your android,elevating my malware: Privilege escalation through mobileos updating. 2014 IEEE Symposium on Security and Privacy(SP)_ IEEE. 2014. 393-408.
  • 7Ren C,Zhang Y, Xue H, et al. Towards discovering andunderstanding task hijacking in android. Proc. of the 24thUSENIX Conference on Security Symposium. USENIXAssociation. 2015. 945-959.
  • 8Egele M, Kruegel C,Kirda E, et al. PiOS: Detecting privacyleaks in iOS applications. NDSS. 2011.
  • 9Wang T, Lu K, Lu L,et al. Jekyll on iOS: When benign appsbecome evil. Usenix Security. 2013,13.
  • 10Mohamed I, Patel D. Android vs iOS security: A comparativestudy. 2015 12th International Conference on InformationTechnology-New Generations (ITNG). EEEE. 2015. 725-730.

二级参考文献45

  • 1JESSE B. Developing secure mobile application for Android[EB/OL] https://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf, 2008.
  • 2SCHMIDT A D, SCHMIDT H G, BATYUK L. Smartphone malware evolution revisited: Android next target[A]. Proceedings of the 4th IEEE/nternational Conference on Malicious and Unwanted Software [C]. USA, 2009. 1-7.
  • 3SCHMIDT A D, SCHMIDT H G, CLAUSEN J. Static analysis of executables for collaborative malware detection on android[A]. IEEE International Congress on Communication (ICC) 2009 - Communica- tion and Information Systems Security Symposium[C]. 2009.
  • 4ENCK W, ONGTANG M, MCDANIEL P. Understanding Android security[J]. IEEE Security and Privacy, 2009, 7(1):50-57.
  • 5SHABTAI A, FLEDEL Y, ELOVICI Y. Securing android-powered mobile devices using selinux[A]. IEEE Security and Privacy[C]. 2009.10-15.
  • 6BERGERON J, DEBBABI M, DESHARNAIS J. Static detection of malicious code in executable programs[A]. Proceedings of the Sym- posium on Requirements Engineering for Information Security[C]. USA, 2001.20-24.
  • 7MOSER A, KRUEGEL C, KIRDA E. Limits of static analysis for malware detection[A]. Proceedings of the 23rd Annual Computer Se- curity Application Conference[C]. Seoul, Korea, 2007.421-430.
  • 8BISHOP M A. The Art and Science of Computer Security[M]. Boston: Addison-Wesley Longman Publishing Co, 2002.213 -217.
  • 9http://www.symantec.com/securityresponse/writeup.j spdoeid=2011- 022303-3344-99[EB/OL].2001.
  • 10Android ( operating system ) [ EB/OL] . [ 2012 - 12 -06] http://en.wikipedia. org/wiki/Android_( operating_system ).

共引文献93

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部