期刊文献+

基于SVM的Android应用程序安全检测综述 被引量:5

Survey on Android application security detection based on SVM
下载PDF
导出
摘要 Android应用程序数量庞大且逐年增加,对其安全进行检测与研究具有重要的意义。当前基于SVM的Android应用程序安全检测技术主要是通过将SVM算法与动、静态分析方法相结合,应用于Android应用程序的漏洞和恶意软件的检测中。恶意软件的检测又可分为恶意行为的检测和恶意代码的检测,提出按SVM算法应用到的检测领域分类,分别对其应用于Android应用程序中的恶意行为检测、恶意代码检测和漏洞检测等方面的研究进行分析与讨论,总结了当前该领域中仍然存在的一些问题,给出了SVM算法和其应用于Android安全检测中的改进之处,最后对未来的发展进行了展望。 The number of Android applications is huge and increases year by year, which also attractes a growing number of hacker attacks. And it is of great significance to detect and study Android application security. Nowadays the technology of Android application security detection based on SVM is mainly applied to detect Android application vulnerabilities and malicious software, which usually combined with both static and dynamic analysis methods. What' s more, malicious software detection can be divided into malicious behavior detection and malicious code detection. So, firstly, according to the field of SVM algorithm applied to Android security detection, this paper made a classification and discusses the related research of SVM algorithm which was applied to the fields of malicious behavior detection, malicious code detection and vulnerability de- tection in Android applications. Then it summarized the current problems which were still existing in this field, and analyzed the methods to improve SVM and its questions on Android security detection application. Finally, it discussed the prospect for the future development.
出处 《计算机应用研究》 CSCD 北大核心 2017年第4期965-971,共7页 Application Research of Computers
基金 国家自然科学基金资助项目(61170276 61373135)
关键词 Android应用程序 安全检测 SVM 恶意行为 恶意代码 漏洞 Android applications security detection SVM malware Malcode vulnerabilities
  • 相关文献

参考文献2

二级参考文献185

  • 1Lab K.First SMS Trojan Detected for Smartphones running Android[EB/OL].(2010-03-05)[2010-11-15].http://www.kaspersky.com/news?id=207576156.
  • 2Wang Z,A Stavrou.Exploiting Smart-Phone USB Connectivity For FunAnd Profit[C] //Annual Computer Security Applications Conference,Austin,Texas USA,2010:357-366.
  • 3Davi L,et al.Privilege escalation attacks on Android[C] //Informa-tion Security Conference-ISC,2010:346-360.
  • 4Roman Schlegel,K Z,Xiaoyong Zhou,et al.Soundcomber:AStealthy and Context-Aware Sound Trojan for Smartphones[C/OL] //Proceedings of the Network and Distributed System Security Symposi-um,NDSS 2011,San Diego,California,USA,6th February–9thFebruary 2011[2011-05-15].http://www.isoc.org/isoc/confer-ences/ndss/11/pdf/1_1.pdf.
  • 5Enck W,Kevin B,et al.Defending Users Against Smartphone Apps:Techniques and Future Directions[C] //Information Systems Security–7th International Conference,ICISS 2011,Kolkata,December 15-19,2011:49-70.
  • 6Gartner:Gartner Says Sales of Mobile Devices in First Quarter of 2011Grew 16.5 Percent Year-on-Year;Smartphone Sales Grew 74 Percent[EB/OL].(2011-08-10)[2011-09-25].http://www.gart-ner.com/it/page.jsp?id=1764714.
  • 7网秦.2011年中国大陆地区手机安全报告[EB/OL].(2012-01-12)[2012-02-25].http://www.netqin.com/upLoad/File/baogao/20120112.pdf.
  • 8Bugiel S,et al.Towards Taming Privilege-Escalation Attacks on An-droid[C] //Information Security Conference-ISC,2010:346-360.
  • 9Google.Android Home Page[OL].2009.http://www.android.com.
  • 10Enck W,M Ongtang,P McDaniel.Mitigating Android software misusebefore it happens[R].The Pennsylvania State University 344 ISTBuilding University Park,PA 16802,USA,22th September 2008.

共引文献163

同被引文献43

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部