期刊文献+

Android广播机制安全性研究 被引量:2

Research on Android security of broadcasting mechanism
下载PDF
导出
摘要 近年来,Android组件的安全性是研究热点,但作为Android四大组件之一的广播接收器,则鲜见有关其安全性的研究成果。在研究Android广播机制的基础上,对其安全结构与特点进行了深入分析。基于Android广播机制的安全挑战,针对性地给出相应的安全对策。最后,总结并展望今后的研究方向。 In recent years, there has been increased interest in the research of Android component security.Broadcast receiver is one of the 4 components in Android, strangely enough, few papers have been published regarding to its security. Android broadcasting mechanism, and its security framework and features based on this were analyzed. According to the security challenges of Android broadcasting mechanism, the corresponding countermeasures and solutions were proposed. Finally, a summary of the results and the future research directions were given.
作者 卿斯汉
出处 《电信科学》 北大核心 2016年第10期27-35,共9页 Telecommunications Science
基金 国家自然科学基金资助项目(No.61170282)~~
关键词 ANDROID系统 广播机制 广播接收器 恶意软件 Android system broadcasting mechanism broadcast receiver malware
  • 相关文献

参考文献9

  • 1ENCK W,ONGTANG M,MCDANIEL P.Understanding Android security[J].IEEE Security&Privacy,2009,7(1):50-57.
  • 2ZHANG M,YIN H.App Sealer:automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications[C]//The 21st Network and Distributed System Security Symp(NDSS 2014),February 23-26,2014,San Diego,California,USA.[S.l.:s.n.],2014.
  • 3OCTEAU D,MCDANIEL P,JHA S,et al.Effective inter-component communication mapping in Android with epicc:an essential step towards holistic security analysis[C]//The 22nd USENIX Security Symp(USENIX 2013),August 14-16,2013,Washington,DC,USA.New York:ACM Press,2013.
  • 4CUI X M,YU D,CHAN P,et al.Co Checker:detecting capability and sensitive data leaks from component chains in Android[C]//The 19th Australasian Conf.(ACISP 2014),July 7-9,2014,Wollongong,Australia.[S.l.:s.n.],2014:446-453.
  • 5卿斯汉.Android安全研究进展[J].软件学报,2016,27(1):45-71. 被引量:107
  • 6杜文涛.Android组件研究—广播接收器[EB/OL].[2016-08-05].http://blog.csdn.net/windskier/article/details/7251742.
  • 7HAMANDI K,CHEHAB A,ELHAJJ I H,et al.Android SMS malware:vulnerability and mitigation[C]//The 27th International Conference on Advanced Information Networking and Applications Workshops,March 25-28,2013,Barcelona,Spain.New Jersey:IEEE Press,2013.
  • 8KIM D,RYOU J.Secure SMS:prevention of SMS interceptionon android platform[C]//The 8th International Conference on Ubiquitous Information Management and Communication(ICUIMC’14),Jan 9,2014,Seam Reab,Cambodia.New York:ACM Press,2014:485-487.
  • 9DU W T.Research on Android component-broadcast receiver[EB/OL].[2016-08-05].http://blog.csdn.net/windskier/article/details/7251742.

二级参考文献150

  • 1Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 2Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 3Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 4Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 5La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 6Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 7Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 8Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.
  • 9Burns J. Developing secure mobile applications for Android. 2008. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/ isec securing_android apps .pdf.
  • 10Enck W, Ongtang M, McDaniel P. Understanding Android security. IEEE Security & Privacy, 2009,7(1):50-57. [doi: 10.1109/MSP 2009.26].

共引文献106

同被引文献21

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部