期刊文献+

一种基于本地代码特征的Android恶意代码检测方法 被引量:4

An Android Malicious Code Detection Method Based on Native Code Features
下载PDF
导出
摘要 由于移动互联网的快速发展,Android系统已经成为市场占有率最高的移动操作系统,Android系统的开源特性使其成为恶意软件的主要攻击目标.面对高速增长的恶意软件,为了有效和准确地检测恶意代码,提出一种基于Android本地代码特征的恶意代码检测方法,该方法的代码覆盖率比传统的静态检测方法高.将Dalvik字节码和SO文件转换为汇编代码,并生成各个函数的控制流图,通过定义的模式对控制流图进行注释,利用子图同构和模式匹配计算控制流图集合的相似度,并与设定阈值比较,以判定待检测的应用是否包含恶意代码.通过实验验证该方法可行,并且该方法的准确率和检测率比静态检测工具Androguard更优. In the face of the rapid growing number of Android malicious code, in order to effectively and accurately detect malicious code,a malicious code detection method based on Android native code features is proposed. The Dalvik bytecode and SO file are converted into ARM assembly code and the control flow graph of each function is generated. The pattern is used to annotate the control flow graph. The subgraph isomorphism and pattern matching are used to calculate the similarity of the control flow graph set. The comparison between the similarity and a threshold determines whether the application to be detected contains malicious code. The code coverage of the method is higher than the traditional static detection method. Finally, the above method is validated by experiments to show this method is feasible and the accuracy and detection rate of the method is better than the static detection tool Androguard.
作者 何平 胡勇 He Ping;Hu Yong(College of Electronics and Information Engineering,Sichuan University,Chengdu 610065)
出处 《信息安全研究》 2018年第6期511-517,共7页 Journal of Information Security Research
关键词 安卓 恶意代码 安卓运行时 控制流图 子图同构 Android malicious code Android runtime control flow graph subgraph isomorphism
  • 相关文献

参考文献6

二级参考文献40

  • 1左强,郝玉洁,刘乃琦.基于Symbian的智能手机防火墙研究与设计[J].微计算机信息,2008,24(9):39-41. 被引量:2
  • 2陈雅娴,袁津生,郭敏哲.基于行为异常的Symbian蠕虫病毒检测方法[J].计算机系统应用,2008,17(11):49-52. 被引量:5
  • 3单永明.一种源程序到控制流图的自动生成方法[J].小型微型计算机系统,1996,17(10):45-49. 被引量:7
  • 4潘娟.移动终端的信息安全.2009信息通信网技术业务发展研讨会.2009:94-99.
  • 5Pavone M. Dex File Format. http://www.retrodev.com/ android/dexformat.html. 2011,12.
  • 6Faidhi JAW, Robinson SK. An empirical approach for detecting program similarity and plagiarism within a university programming environment, Computers & Education, 1987,11(1).
  • 7Belkhouche B, Nix A, Hassell J. Plagiarism detection in software designs. Proc. of the 42nd Annual Southeast Regional Conference.
  • 8Ji JH, Woo PG, Cho PG A source code linearization technique for detecting plagiarized programs. Proc. of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education. 2007.
  • 9Gitchell D, Tran N. Sim: a utility for detecting similarity in computer programs. SIGCSE '99: Proc. of the 30th SIGCSE Technical Symposium on Computer Science Education. New York: ACM, 1999: 266-270.
  • 10Whale G Identification of program similarity in large populations. Comput. J, 1990,33(2): 140-146.

共引文献52

同被引文献27

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部