期刊文献+

基于应用层漏洞的安卓应用防护技术研究 被引量:1

Research on Android Application Protection Technology Based on Application Layer Vulnerability
下载PDF
导出
摘要 随着移动互联网的高速发展,移动应用已经成为了人们日常生活的重要组成部分。同时移动应用面临着日趋严峻的安全问题,其存在的安全漏洞给用户的隐私和财产带了极大的威胁。提出并实现了基于应用层安全漏洞的安卓应用安全防护系统,通过深入挖掘和剖析应用层的安全漏洞,分析了针对移动应用漏洞的攻击模式,形成了相应的安全防护策略,并最终以内嵌的方式集成到加固应用中。经实验表明,该系统能够有效地检测并防御应用层的安全漏洞。 With the rapid development of mobile Internet, mobile applications have become an important part of people’s daily lives. At the same time, mobile applications are facing increasingly severe security problems, and their existing security vulnerabilities pose a great threat to users’ privacy and property. An android application security protection system based on the application layer security vulnerability is proposed and implemented. By digging and analyzing the application layer security vulnerability in-depth, the attack mode of mobile application vulnerability is analyzed, and the corresponding security protection strategies are formed and finally integrated into the reinforcement application in an embedded way. And the experiment shows that the system can effectively detect and defend the security vulnerabilities in the application layer.
作者 麦松涛 贾世准 冯晓荣 MAI Songtao;JIA Shizhun;FENG Xiaorong(CEPREI,Guangzhou 510610,China)
出处 《电子产品可靠性与环境试验》 2018年第A01期70-74,共5页 Electronic Product Reliability and Environmental Testing
关键词 安卓应用 安全防护 应用层漏洞 android application security protection application layer vulnerability
  • 相关文献

参考文献2

二级参考文献22

  • 1Aleksandrina Kovacheva. Efficient code obfuscation for Android[J]. Communications in Computer and Informa- tion Science, 2013, 409: 104-119.
  • 2Patrick Schulz. Android security analysis challenge: tam- pering Dalvik bytecode during runtime [ EB/OL]. Blue- boxSec, 2013. https: // bluebox, com/technical/android- security-analysis-challenge-tampering-dalvik-bytecode-dur- ing-runtime.
  • 3Bill Horne, Lesley Matheson, Casey Sheehan, et al. Dynamic self-checking techniques for improved tamper resistance[J]. Security and Privacy in Digital Rights Management, 2002, 2320: 141-159.
  • 4Shamir A. How to share a secret[ J]. Communications of the ACM, 1979, 24(11) : 612-613.
  • 5Google. Bouncer[Z/OL]. (2012-02-18). http://googlemobile.blogspot.com/2012/02/android-and-security.html.
  • 6Felt A P, Finifter M, Chin E, et al. A survey of mobile malware in the wild[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11). Chicago, USA:ACM, 2011:1-14.
  • 7Grace M, Zhou Y, Wang Z, et al. Systematic detection of capability leaks in stock Android smartphones[C]//Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS'12). San Diego, USA:ISOC, 2012:107-121.
  • 8Wang R, Xing L, Wang X, et al. Unauthorized origin crossing on mobile platforms:Threats and mitigation[C]//Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS'13). Berlin, Germany:ACM, 2013:635-646.
  • 9Zhou Y, Jiang X. Dissecting Android malware:Characterization and evolution[C]//Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P'12). San Francisco, USA:IEEE, 2012:95-109.
  • 10Zhou Y, Wang Z, Zhou W, et al. Hey, you, get off of my market:Detecting malicious apps in official and alternative Android markets[C]//Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS' 12). San Diego, USA:ISOC, 2012:1-13.

共引文献10

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部