期刊文献+

基于逆向工程的Android应用漏洞检测技术研究 被引量:1

Android application vulnerability detection technology based on reverse engineering
下载PDF
导出
摘要 Android应用程序面临着各种各样的安全威胁,针对如何在黑客利用Android程序漏洞攻击前发现潜在漏洞的漏洞检测技术研究,提出了一种基于APK逆向分析的应用漏洞检测技术.在逆向反编译APK静态代码的基础上,运用特征提取算法将smali静态代码解析转换为函数调用图作为特征来源,建立原始特征集合提取模型,继而通过改进ReliefF特征选择算法对原始特征集合进行数据降维,提取APK包中的漏洞特征向量,依次构建漏洞的检测规则.再结合Android漏洞库收录的漏洞特征对特征向量进行正则匹配,以挖掘其中潜在的安全漏洞.基于该检测方法实现了系统模型并进行对比性实验,实验结果表明此检测方法的漏洞检出率达91%以上.因此,该漏洞检测技术能够有效挖掘Android应用中常见的安全漏洞. Android applications are faced with a variety of security threats. Aiming at how to detect potential vulnerabilities before hackers exploit Android vulnerabilities,a vulnerability detection technique based on APK reverse analysis was proposed. On the basis of reverse decompiling APK static code,using feature extraction algorithm to transform smali static code parsing into function calling graph as feature source,the original feature set extraction model was established. Then the dimension of the original feature set was reduced by the improved ReliefF feature selection algorithm,and the vulnerability features in the APK packet were extracted. The quantity constructed the flaw detection rule in turn. In order to mine the potential security vulnerabilities,the feature vectors were regularly matched with the vulnerability features included in the Android vulnerability library.Based on this detection method,the system model was implemented and a comparative experiment is carried out. The experimental results showed that the detection rate of this method was over 91%. Therefore,the vulnerability detection technique can effectively mine common security vulnerabilities in Android applications.
作者 许庆富 谈文蓉 王彩霞 XU Qing-fu;TAN Wen-rong;WANG Cai-xia(School of Computer Science and Technology,Southwest Minzu University,Chengdu 610041,P.R.C.;Key Laboratory for Computer Systems of State Ethnic Affairs Commission,Southwest Minzu University,Chengdu 610041,P.R.C.)
出处 《西南民族大学学报(自然科学版)》 CAS 2018年第5期512-520,共9页 Journal of Southwest Minzu University(Natural Science Edition)
基金 四川省科技支撑计划项目(2014GZ0006) 西南民族大学中央高校优秀学生培养工程项目(2018YXXS18)
关键词 移动安全 逆向工程 漏洞挖掘 特征提取 数据降维 mobile security reverse engineering vulnerability mining feature extraction data dimensionality reduction
  • 相关文献

参考文献6

二级参考文献175

  • 1JESSE B. Developing secure mobile application for Android[EB/OL] https://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf, 2008.
  • 2SCHMIDT A D, SCHMIDT H G, BATYUK L. Smartphone malware evolution revisited: Android next target[A]. Proceedings of the 4th IEEE/nternational Conference on Malicious and Unwanted Software [C]. USA, 2009. 1-7.
  • 3SCHMIDT A D, SCHMIDT H G, CLAUSEN J. Static analysis of executables for collaborative malware detection on android[A]. IEEE International Congress on Communication (ICC) 2009 - Communica- tion and Information Systems Security Symposium[C]. 2009.
  • 4ENCK W, ONGTANG M, MCDANIEL P. Understanding Android security[J]. IEEE Security and Privacy, 2009, 7(1):50-57.
  • 5SHABTAI A, FLEDEL Y, ELOVICI Y. Securing android-powered mobile devices using selinux[A]. IEEE Security and Privacy[C]. 2009.10-15.
  • 6BERGERON J, DEBBABI M, DESHARNAIS J. Static detection of malicious code in executable programs[A]. Proceedings of the Sym- posium on Requirements Engineering for Information Security[C]. USA, 2001.20-24.
  • 7MOSER A, KRUEGEL C, KIRDA E. Limits of static analysis for malware detection[A]. Proceedings of the 23rd Annual Computer Se- curity Application Conference[C]. Seoul, Korea, 2007.421-430.
  • 8BISHOP M A. The Art and Science of Computer Security[M]. Boston: Addison-Wesley Longman Publishing Co, 2002.213 -217.
  • 9http://www.symantec.com/securityresponse/writeup.j spdoeid=2011- 022303-3344-99[EB/OL].2001.
  • 10Gustafsson Andreas.Egypt:create call graph from GCC RTL dump,http://www.gson.org/egypt/egypt.html.[2013-06-23].

共引文献149

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部