期刊文献+

一种基于行为的Android重打包应用检测方案 被引量:3

A BEHAVIOUR-BASED DETECTION SCHEME FOR ANDROID REPACKAGED APPLICATION
下载PDF
导出
摘要 重打包类型的恶意应用是通过将恶意代码注入正常应用来生成的,在Android平台已发现的恶意应用中占了很大的比例。针对此类恶意应用,提出一种基于行为的恶意应用检测方案。方案采用云端协作的软件架构,在云端对正常应用进行基于系统短序列的行为模式分析,从而形成正常行为模式库;在终端,从云端下载系统已安装应用的正常行为模式库,监测已安装应用的系统调用序列,并计算其异常率。实验结果表明,该方法是有效的,可以准确地识别出重打包的恶意应用。 M a licio u s ap plication s o f repackaged types are generated by in je c tin g the m a licio us code in to norm al a p p lic a tio n s , w hichaccounts fo r a large percentage o f m a licio us ap plication s in A n d ro id platform s. To solve th is p ro b le m , we propose a behaviour-based detectionscheme fo r A n d ro id repackaged a p p lica tio n . The scheme uses the software architectu re w ith cloud c o lla b o ra tio n , analyses in the cloud thebehaviou r patterns on norm al ap plication s based on short sequences o f system calls so that form s a norm al behaviour pa ttern database. Inte rm in a l d e vice , it downloads fro m the cloud the norm al behaviour pattern databases w ith the application s in s ta lle d , m onitors the system ca llsequences w ith the ap plication s in s ta lle d , and calculates th e ir abnorm al rate. E xperim enta l re sult shows that the proposed m ethod is e ffe c tiv e ,and it can accurately id e n tify the m a licio us repackaged application s.
作者 桓自强 倪宏 胡琳琳 郭志川 Huan Ziqiang;Guo Zhichuan;Ni Hong;Hu Linlin(National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, Beijing 100190, China;University of Chinese Academy of Sciences ,Beijing 100049, China)
出处 《计算机应用与软件》 CSCD 2016年第8期298-301,307,共5页 Computer Applications and Software
基金 国家科技支撑计划课题(2012BAH73F01) 中国科学院先导专项课题(XDA06040501)
关键词 重打包应用 Android安全 系统调用 短序列 云端协作 Repackaged applications Android security System call Short sequence Cloud collaboration
  • 相关文献

参考文献4

二级参考文献74

  • 1Lab K.First SMS Trojan Detected for Smartphones running Android[EB/OL].(2010-03-05)[2010-11-15].http://www.kaspersky.com/news?id=207576156.
  • 2Wang Z,A Stavrou.Exploiting Smart-Phone USB Connectivity For FunAnd Profit[C] //Annual Computer Security Applications Conference,Austin,Texas USA,2010:357-366.
  • 3Davi L,et al.Privilege escalation attacks on Android[C] //Informa-tion Security Conference-ISC,2010:346-360.
  • 4Roman Schlegel,K Z,Xiaoyong Zhou,et al.Soundcomber:AStealthy and Context-Aware Sound Trojan for Smartphones[C/OL] //Proceedings of the Network and Distributed System Security Symposi-um,NDSS 2011,San Diego,California,USA,6th February–9thFebruary 2011[2011-05-15].http://www.isoc.org/isoc/confer-ences/ndss/11/pdf/1_1.pdf.
  • 5Enck W,Kevin B,et al.Defending Users Against Smartphone Apps:Techniques and Future Directions[C] //Information Systems Security–7th International Conference,ICISS 2011,Kolkata,December 15-19,2011:49-70.
  • 6Gartner:Gartner Says Sales of Mobile Devices in First Quarter of 2011Grew 16.5 Percent Year-on-Year;Smartphone Sales Grew 74 Percent[EB/OL].(2011-08-10)[2011-09-25].http://www.gart-ner.com/it/page.jsp?id=1764714.
  • 7网秦.2011年中国大陆地区手机安全报告[EB/OL].(2012-01-12)[2012-02-25].http://www.netqin.com/upLoad/File/baogao/20120112.pdf.
  • 8Bugiel S,et al.Towards Taming Privilege-Escalation Attacks on An-droid[C] //Information Security Conference-ISC,2010:346-360.
  • 9Google.Android Home Page[OL].2009.http://www.android.com.
  • 10Enck W,M Ongtang,P McDaniel.Mitigating Android software misusebefore it happens[R].The Pennsylvania State University 344 ISTBuilding University Park,PA 16802,USA,22th September 2008.

共引文献122

同被引文献11

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部