期刊文献+

基于JDWP的Android应用程序恶意行为检测研究

Research on Malicious Behavior Detection of Android Applications Based on JDWP
下载PDF
导出
摘要 当前Android恶意应用程序威胁越来越多,因此首先介绍了当前Android应用程序动态检测技术背景和发展趋势,其后重点介绍以JDWP协议为基础的恶意行为检测方法和检测技术,最后与实际检测经验结合,介绍如何依照检测结果对应用程序恶意行为进行分析和判断。 At present, the threat of malicious Android applications is more and more severe. Firstly, the background and developmental trend of Android application dynamic detection techniques were introduced. Then, the detection method and technique of malicious behaviors based on JDWP protocol were expounded in detail. Finally, the analysis and judgment of malicious behaviors of applications according to experience and detected results were elaborated.
作者 王宇晓
出处 《移动通信》 2017年第7期35-39,共5页 Mobile Communications
关键词 Android应用程序 动态检测 JDWP 恶意行为分析 Android application dynamic detection JDWP malicious behavior analysis
  • 相关文献

参考文献2

二级参考文献13

  • 1International Telecommunication Union. The World in 2011: ICT Facts and Figures[EB/OL]. http://www.itu.int/ITU-D/ict/material/ FactsFigures2011.pdf, 2012-06-15.
  • 2Comscore. 2012 Mobile Future In Focus[EB/OL] .http://www. comscore.com/Press_Events/Presentations_Whitepapers/2012/ 2012_Mobile Future in Focus, 2012-02-23.
  • 3赛诺市场研究公司.中国智能手机与手机安全市场现状(第一季度)[EB/OL].htqo://www.sino-mr.com/cn/detail.asp?CategorylD=347&ProductlD=1376,2012-06-15.
  • 4网秦.2012年第一季度全球Android手机安全报告[EB/OL].www.netqin.com.2012.
  • 5Google Android. The Developer's Guide [EB/OL]. http://developer. android.com/guide/index.html, 2012-06-15.
  • 6A. R. Flo and Audun Josang. Consequences of Botnets Spreading to Mobile Devices[C], Short-Paper Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). 2009, 37-43.
  • 7K. Dunham. Mobile Malware Attacks and Defense[M]. Syngress Publishing, 2008.
  • 8T. Cannon. Android Data Stealing Vulnerability[EB/OL].http:// thomascannon.net/blog/2010/11/android-data-stealing-vulnerability, 2012-06-15.
  • 9P. Traynor, et al.On cellular bomets: measuring the impact of malicious devices on a cellular network core[C], CCS 09 Proceedings of the 16th ACM conference on Computer and communications security, 2009, 223-234.
  • 10R. Racic. Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery[C]. In SecureComm 06, 2006, 1-10.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部