期刊文献+

基于白名单与主动防御混搭的安卓终端安全应用研究

Research on the security application of Android terminal based on white list and active defense
下载PDF
导出
摘要 在安全关注程度极高的安卓终端无线组网模式下,提出了白名单与主动防御混搭的安卓终端安全防御体系.对防御体系架构和技术架构进行了设计和梳理,并对安卓环境下的防御链、杀伤链、管理链进行了研究和分析,提出并实现了以权值为基础的行为分析算法,并在Android 5.x、Android 6.x进行核心算法验证,有效的提高了终端安全性能. In the Android terminal wireless networking model with high security concern, an Android terminal security defense system is proposed, which is a mixture of white list and active defense. The defense system architecture and technical architec- ture are studied and designed, the defense chain, kill chain and management chain in Android defense environment are ana- lyzed ,the behavior analysis algorithm based on right value are proposed and implemented ,the core algorithm is verified in An- droid 5. x and Android 6. x, and the performance safety of terminal is effectively improved.
作者 何远德 周序林 HE Yuan-de;ZHOU Xu-lin(School of Foreign Languages, Southwest Minzu University, Chengdu 610041, P. R. C.;School of Chinese Literature & Journalism, Southwest Minzu University, Chengdu 610041, P. R. C.)
出处 《西南民族大学学报(自然科学版)》 CAS 2018年第2期176-183,共8页 Journal of Southwest Minzu University(Natural Science Edition)
基金 四川省软科学研究计划(2016ZR0149) 中央高校基本科研业务费专项基金项目(2016NZYQN40)
关键词 白名单 主动防御 安卓 杀伤链 防御链 white list active defense Android kill chain defense chain
  • 相关文献

参考文献9

二级参考文献379

  • 1傅建明,李鹏伟,易乔,黄诗勇.Android组件间通信的安全缺陷静态检测方法[J].华中科技大学学报(自然科学版),2013,41(S2):259-264. 被引量:9
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3Kaspersky. Mobile malware evolution part 5 [OL]. (2012-02-28) [2012-08-01]. http://www. securelist. com/en/analysis/204792222.
  • 4F-secure. Mobile security [EB/OL]. [2012-08-01]. http://www. f-secure. com/en/web/labs_global/mobile-security.
  • 5Passed P. One year of Android malware (full list)[EB/OL].[2012-08-01]. http : I j hackmageddon. com/tag/androidyzhcsms-a/.
  • 6Gert S. Google play tops 500 000 applications [EB/OL].[2012-08-01]. http://www. distimo. com/blog/2012 _ 05 _google-play-tops-500000-applications/.
  • 7Bose A, Hu Xin, Shin G,et al. Behavior detection ofmalware on mobile handsets [C]//Proc of MobiSys,2008.New York: ACM, 2008: 225-238.
  • 8Jiang Xuxiang. Android/RogueSPPush [EB/OL]. (2011-08-16 ) [2012-08-01 http://www. cs. ncsu. edu/faculty/jiang/RogueSPPush/.
  • 9F-secure. Android/Zsone. a [EB/QL]. [2012-08-01]. http://www. f-secure. com/v-descs/trojan_Android_zsone_a. shtml.
  • 10F-secure. Smsspacem. A [EB/OL]; [2012-08-01]. http://www. f-secure. com/v-descs/ trojan _ android _ smspacem _ a.shtml.

共引文献254

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部