期刊文献+

基于函数调用图的Android重打包应用检测 被引量:2

Android Repackaged Application Detection Based on Function Call Graph
下载PDF
导出
摘要 针对Android第三方市场中重打包应用日益增多的现象,提出一种利用函数调用图检测Android重打包应用的方法。对应用进行反编译,提取并分析Smali代码生成函数调用图,同时将函数中的操作码作为结点的属性对函数调用图进行处理,实现第三方库过滤并保留与界面相关的应用程序接口。在此基础上,用Motif子图结构表示函数调用图,根据子图的相似度计算应用的相似度,从而判断是否为重打包应用。通过对市场中1 630个应用的检测结果表明,该方法具有较高的准确性和良好的可扩展性。 Aiming at the phenomenon that there is an increasing number of repackaged applications in the Android third-party application market,this paper proposes a method of detecting Android repackaged applications by using function call graph. It decompiles the application to gain the Smali code, analyzes the Smali code to generate a function call graph,processes the function call graph by using theoperationcode as the attribute of the node,filters the third-party library, and saves the Application Program Interface( API) associated with the interface. On this basis,it uses the Motifs' substructure to representthe function call graph. According to the similarity of the subgraph,it computes the similarity of the application, so as to determine whether it is a repackaged application. Detection results in 1 630 applications in the market show that the proposed method has higher accuracy and better expansibility.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第11期122-127,139,共7页 Computer Engineering
基金 国家自然科学基金(61402035)
关键词 ANDROID系统 重打包应用 函数调用图 相似度 子图 Android system repackaged application function call graph similarity subgraph
  • 相关文献

参考文献3

二级参考文献24

  • 1Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 2Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 3Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 4Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 5Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 6Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 7Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 8Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 9Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.
  • 10Gilbert P,Chun B,Cox L P,et al.Vision:Automated SecurityValidation of Mobile Apps at App Markets[C]//Proc.of MCS’11.Washington D.C.,USA:[s.n.],2011.

共引文献29

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部