期刊文献+

基于函数调用图的Android恶意软件检测 被引量:2

Android Malware Detection Based on Function Call Graph
下载PDF
导出
摘要 为了有效检测Android恶意软件,提出一种基于函数调用图的检测方法。通过将应用程序的函数调用关系表示为图结构,结合深度学习处理图的算法对图结构经过节点排序、归一化等处理,生成能够输入卷积神经网络的局部感受野从而建立恶意软件分类模型。通过和不同的恶意软件检测模型对比,证明基于图结构的检测方法有较高的检测准确率和检测效率。 In order to detect Android malware effectively, proposes a method based on function call graph. By expressing the function call relation of the Android application as the graph structure, uses the algorithm of the deep learning for graphs to process the graph structure through node ordering, normalization and so on, and generates the local receptive field of the convolutional neural network to establish the malware classification model. The Experiments show that the detection method has a high detection accuracy and efficiency by comparing with dif- ferent malware detection models.
作者 李璐 LI Lu(School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044)
出处 《现代计算机》 2018年第8期28-33,共6页 Modern Computer
关键词 ANDROID 恶意软件检测 函数调用图 深度学习 卷积神经网络 Android Malware Detection Function Call Graph Deep Learning Convolutional Neural Network
  • 相关文献

参考文献1

二级参考文献76

  • 1Steven M P.Contrary to what you've heard,Android is almost impenetrable to malware[EB/OL].[2014-06-23].http://qz.com/131436/contrary-to-what-youveheard-android-is-almost-impenetrable-to-malware/.
  • 2Zhou Y,Jiang X.An analysis of the AnserverBot trojan[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf.
  • 3F-Secure’s Security Labs.Trojan:Android/BaseBridge.A[EB/OL].[2014-06-23].http://www.fsecure.com/v-descs/trojan_android_basebridge.shtml.
  • 4F-Secure’s Security Labs.Droid KungFu Utilizes an Update Attack[EB/OL].(2011-10-05)[2014-06-23].http://www.f-secure.com/weblog/archives/00002259.html.
  • 5Jiang X X.Security Alert:New Stealthy Android Spyware-Plankton-Found in Official Android Market[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/Plankton/.
  • 6Goegre code.Asroot[EB/OL].[2012-02-07].http://code.google.com/p/flashrec/source/browse/#svn%2Ftrunk%2Fandroid-root.
  • 7SEBASTIAN.Android trickery[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/07/androidtrickery.html.
  • 8SEBASTIAN.Droid2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/08/droid2.html.
  • 9SEBASTIAN.Zimperlich sources[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/02/zimperlich-sources.html.
  • 10SEBASTIAN.adb trickery#2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/01/adbtrickery-again.html.

共引文献48

同被引文献24

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部