期刊文献+

基于函数调用关系的Android应用权限泄露漏洞挖掘技术研究 被引量:1

原文传递
导出
摘要 自Google发布Android系统以来,各大Android应用市场上APP的数量不断增长,Android应用程序安全问题也日益突出。本文通过对Android应用程序中常见的权限泄露漏洞形成原理进行研究,提出一种针对由暴露组件引起的权限泄露漏洞挖掘方法,旨在帮助开发者和用户及时发现存在这种威胁的Android应用程序,防止用户的隐私泄露和财产损失。本文方法在对Android应用程序进行静态分析得到可疑路径的基础上构造测试用例进行验证测试,具有更强的针对性,避免了进行动态测试时的盲目性,可有效地发现Android应用中存在的权限泄露漏洞。
出处 《网络安全技术与应用》 2017年第2期90-92,共3页 Network Security Technology & Application
  • 相关文献

参考文献4

二级参考文献45

  • 1吴泉源 刘江宁.人工智能与专家系统[M].长沙:国防科技大学出版社,2000..
  • 2Ritchie 0 M,Thompson K. The UNIX time-sharing system [ J ]. BellSystem Technical Journal, 1978,57(6): 1905-1929.
  • 3Qiu Lili, Zhang Yin, Wang Feng, et al. Trusted computer systemevaluation criteria [ S ]. [ S. 1. ] : National Computer Security Center,1985.
  • 4Barrera D, Kayacik H G, Van Oorschot P C, ei al. A methodologyfor empirical analysis of permission-based security models and its ap-plication to Android[ C ] //Proc of the 17th ACM Conference on Com-puter and Communications Security. New York : ACM Press, 2010 :73-84.
  • 5Felt A P, Greenwood K, Wagner D. The effectiveness of install-timepermission systems for third-party applications, UCB/EECS-2010-143[R]. Berkeley: University of California, 2010.
  • 6Felt A P, Ha E, Egelman S, et al. Android permissions: user atten-tion, comprehension, and behavior[ C ] //Proc of the 8th Symposiumon Usable Privacy and Security. New York : ACM Press, 2012 : 3.
  • 7Nauman M, Khan S, Zhang X. Apex: extending Android permissionmodel and enforcement with user-defined runtime constraints [ C ]//Proc of the 5th ACM Symposium on Information, Computer and Com-munications Security. New York:ACM Press, 2010: 328-332.
  • 8Conti M,Nguyen V T N, Crispo B. CRePE: context-related policyenforcement for Android [ M ] //Information Security. Berlin : Sprin-ger, 2011: 331-345.
  • 9Ongtang M,McLaughlin S,Enck W,et al. Semantically rich appli-cation-centric security in Android [ J ]. Security 3nd Communica-tion Networks, 2012, 5(6) : 658-673.
  • 10Davi L, Dmitrienko A, Sadeghi A R, ef al. Privilege escalationattacks on Android [ M ]//Information Security. Berlin : Springer,2011: 346-360.

共引文献68

同被引文献19

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部