期刊文献+

基于动态信息流的Android应用检测 被引量:1

Test of Android application based on dynamic information flow
下载PDF
导出
摘要 针对Android应用中普遍存在的隐私窃取问题,提出一种基于动态信息流的Android恶意应用检测方法。定制合适的Android内核,在应用运行过程中收集相关的文件操作与进程通信信息;基于隐私数据集构建动态信息流模型;通过跟踪动态信息流,判定隐私数据是否被发送、是否导致信息泄露。大规模的实验结果表明,该方法对隐私窃取类应用检出率高达94.57%,验证了其有效性。 The increasing presence of Android privacy leakages poses a significant private risk for Android smartphone users.An Android malware detection method based on dynamic information flow was proposed.A fit Android kernel was made,which collected related operations of files and the information of process communication.Dynamic information flow model based on private data was constructed.By tracking the dynamic information flow,whether the private data was sent and whether it caused information leakage were judged.Results of large scale experiments show that the detection rate of the proposed method reaches 94.57% for privacy leakage applications.The results verify the good detection capacity of the proposed method.
出处 《计算机工程与设计》 北大核心 2017年第10期2646-2651,共6页 Computer Engineering and Design
关键词 ANDROID应用 隐私窃取 动态信息流 系统调用 动态检测 Android application privacy leakage dynamic information flow system call dynamic test
  • 相关文献

参考文献5

二级参考文献54

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 3Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 4Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 5Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 6Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 7Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 8Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 9Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 10Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.

共引文献85

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部