期刊文献+

有色Petri网的Android恶意代码建模方法研究

Research on Modeling Method of Android Malware Based on Colored-Petri Nets
下载PDF
导出
摘要 针对Android平台的恶意代码分析建模一直是目前移动终端安全的研究重点,对目前常见的恶意代码进行归纳、分类和行为抽取,在对行为进行形式化描述的基础上,提出了一种基于有色Petri网(colored-Petri net,CPN)的恶意代码建模方法,使用该方法能够描述恶意代码从安装、加载到恶意执行的整个过程。最后对恶意软件Bean Bot进行建模,并利用CPN Tools仿真工具分析了模型的可达性和有界性等性质。实验表明该方法可以准确地刻画恶意代码的运行过程,有助于对恶意代码的机制进行深入分析。 Analysis and modeling of Android malware is the research emphasis of mobile terminal security. This paper summarizes and classifies the Android malwares, and extracts the behavior. On the basis of formal description of the behavior, this paper proposes a new modeling method of malwares based on colored-Petri net (CPN). The proposed method can help describe the whole process of malwares from installation, loading to malicious execution. Finally,this paper makes modeling for malware BeanBot, and analyzes the reachability and boundedness of the model via CPN Tools. The experimental data show that the proposed method can accurately describe the running process of malwares,and it will help analyze the mechanism of malwares in depth.
作者 李登辉 焦健 陈昕 宋亚鹏 肖庆 LI Denghui;JIAO Jian;CHEN Xin;SONG Yapeng;XIAO Qing(College of Computer Science and Technology, Beijing Information Science and Technology University, Beijing 100101, China;College of Historical Culture and Turism, Guangxi Normal University, Guilin, Guangxi 541001, China)
出处 《计算机科学与探索》 CSCD 北大核心 2017年第1期99-105,共7页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金 国家科技重大专项 国家科技支撑计划项目~~
关键词 安卓系统 恶意代码 颜色Petri网(CPN) 行为建模 Android malware colored-Petri net (CPN) behavior modeling
  • 相关文献

参考文献2

二级参考文献76

  • 1Steven M P.Contrary to what you've heard,Android is almost impenetrable to malware[EB/OL].[2014-06-23].http://qz.com/131436/contrary-to-what-youveheard-android-is-almost-impenetrable-to-malware/.
  • 2Zhou Y,Jiang X.An analysis of the AnserverBot trojan[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf.
  • 3F-Secure’s Security Labs.Trojan:Android/BaseBridge.A[EB/OL].[2014-06-23].http://www.fsecure.com/v-descs/trojan_android_basebridge.shtml.
  • 4F-Secure’s Security Labs.Droid KungFu Utilizes an Update Attack[EB/OL].(2011-10-05)[2014-06-23].http://www.f-secure.com/weblog/archives/00002259.html.
  • 5Jiang X X.Security Alert:New Stealthy Android Spyware-Plankton-Found in Official Android Market[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/Plankton/.
  • 6Goegre code.Asroot[EB/OL].[2012-02-07].http://code.google.com/p/flashrec/source/browse/#svn%2Ftrunk%2Fandroid-root.
  • 7SEBASTIAN.Android trickery[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/07/androidtrickery.html.
  • 8SEBASTIAN.Droid2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/08/droid2.html.
  • 9SEBASTIAN.Zimperlich sources[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/02/zimperlich-sources.html.
  • 10SEBASTIAN.adb trickery#2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/01/adbtrickery-again.html.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部