期刊文献+

Android系统中恶意代码的动态检测技术研究 被引量:1

Dynamic detection technology of malicious code for Android system
下载PDF
导出
摘要 随着手机普及程度的日益提高,人们对智能手机的依赖性加重,手机的安全性问题变得愈加突出.根据Android安装包(APK)文件的权限调用和Android系统的应用程序接口(API)函数调用情况,设计了一种基于API拦截技术的检测恶意代码的动态检测方法.实验结果表明,该方法可以有效检测并报告Android系统中的恶意代码. With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.
作者 李博亚 薛质
出处 《上海师范大学学报(自然科学版)》 2017年第1期16-22,共7页 Journal of Shanghai Normal University(Natural Sciences)
关键词 ANDROID 应用程序编程接口 恶意代码 动态检测 Android API malicious code dynamic detection
  • 相关文献

参考文献3

二级参考文献14

  • 1王硕,周激流,彭博.基于API序列分析和支持向量机的未知病毒检测[J].计算机应用,2007,27(8):1942-1943. 被引量:21
  • 2Mihai Christodorescu, Somesh Jha, Christopher Kruegel. Mining specifications of malicious behavior [C]. Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, September 2007.
  • 3Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye.IMDS: intelligent malware detection system[C]. Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining,August 2007.
  • 4Greg Hoglund,James Butler.Rootkits-Windows内核的安全防护[M].韩智文北京:清华大学出版社,2007.
  • 5腾讯移动安全实验室.腾讯移动安全实验室2012年第三季度手机安全报告.北京:腾讯移动安全实验室,2012.
  • 6M. Miettinen, P. Halonen. Host-based intrusion detection foradvanced mobile devices[J]. Information Networking andApplications, 2006,20(4): 72-76.
  • 7detection of malware on mobile handsets[A]. AbhijitBose.MobiSys '08 Proceedings of the 6th internationalconference on Mobile systems[C]. America : ACM New York.
  • 8B.Scholkopf,A.J.Smola. Learning with kernels:supportvector machines regularization optimization and beyond[M].American:the MIT Press,2002.
  • 9Aubrey-Derrick Schmidt,Rainer Bye,Hans-Gunther Schrnidt,Kamer All Yu ksel,Osman Kiraz. Static analysis of executables for collaborative malware detection on android[A]. Aubrey-Derrick Schmidt. ICC 2009 IEEE International Conference[C]. Germany.. Berlin.
  • 10C.E. Perkins. Ad hoc networking[M]. American.. Addison-Wesley Professional press, 2008.

共引文献20

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部