期刊文献+

基于静态分析的虚假安卓APP分析与检测 被引量:2

Analysis and Detection of Fraud Android APPs based on Static Analysis
下载PDF
导出
摘要 针对日益泛滥的虚假安卓APP,分析了安卓APP的多方面特征,设计并实现了一种基于静态分析的虚假安卓APP分析与检测系统。系统通过反编译安卓APK文件,分析并提取出包的信息和代码特征作为分类的特征向量,采用多种机器学习算法进行分类,并对其虚假程度进行分析与检测。通过实验对比不同机器学习算法在虚假安卓APP分类与检测的准确率,分析了不同机器学习算法的局限性。实验结果表明,该系统能够高效率、高准确率地检测虚假安卓APP。 Aiming at the proliferation of false android APP,various characteristics extracts packet information of the android APP are analyzed,the analysis and detection system of fraud android APP base n static analysis is designed and implemented.By decompiling android APK files,the system analyzes and extracts packet information and code features as the feature vectors of classification.A variety of machinelearning algorithms are used to classify and analyze the false degree.Experiment and comparison are done on the accuracy of different machine-learning algorithms in false android APP classification and detection,and the limitations of different machine-learning algorithms also analyzed.The experiment results indicate that this system could efficiently and accurately detect false android APP.
作者 齐林 刘功申 孟魁 蔡逆水 QI Lin;LIU Gong-shen;MENG Kui;CAI Ni-shui(School of Electronic Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China;State Engineering Laboratory for Mobile Internet System and Application Security,Shanghai 201315,China)
出处 《通信技术》 2017年第12期2840-2845,共6页 Communications Technology
关键词 虚假APP 特征提取 随机森林 静态分析 fraud APP feature extraction random forest static analysis
  • 相关文献

参考文献7

二级参考文献23

  • 1田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 2Google. Android Architecture [EB/OL]. http://developer.android. com/guide/basics/what-is-android.html, 2012-09-11.
  • 3网秦.2011年第一季度全球Android手机安全报告[EB/OL].http://wwwnetqin.com/security/securityinfo.jsp?id.4043.2012-09-11.
  • 4Google. Security and Permissions [EB/OL]. http://developer.android. com/guide/topics/security.html, 2012-09-11.
  • 5Google. What is the NDK [EB/OL]. http://developer.android.com/ sdk/ndk/overview.html, 2012-09-11.
  • 6Zovi, Dino Dai. Kernel Rootkits[J]. Sandia National Laboratories, 2001.
  • 7Google. Android Interface Definition Language [EB/OL]. http:// developer.android.com/ guide/ developing/ tools/ aidl.hanl, 2012-09-11.
  • 8Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy. Privilege Escalation Attacks on Android[l]. Ruhr-University Bochum, 2010.
  • 9Christian Papathanasiou, Nicholas J. Percoco. This is Not the Droid you're looking for[J]. Trustwave, 2010.
  • 10Joany Boutet, Lori Homsher. Malicious Android Applications: Risks and Exploitation[J]. SANS Institute, 2010.

共引文献37

同被引文献10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部