期刊文献+

移动设备恶意代码分析与检测技术研究

Research on Malicious Code Analysis and Detection Technology of Mobile Equipment
下载PDF
导出
摘要 当前,各种移动设备快速普及,移动应用为人类带来各种新的互联网体验。然而,移动应用在给人类带来新的服务的同时,其中存在的信息泄露、欺骗仿冒、病毒木马等安全隐患也严重威胁着用户的个人信息和财产安全。笔者开展移动设备恶意代码分析和检测技术研究,首先从应用开放环境和检测躲避技术两个方面阐述了移动恶意代码产生且难以根治的原因,然后介绍了当前常见移动恶意代码检测技术,包括基于特征码的检测技术、基于代码分析的检测技术和基于行为监控的检测技术三种,并详细说明这三种方法的基本原理和优缺点。 At present,with the rapid spread of various mobile devices,mobile applications provide a variety of new Internet experience for human beings.However,mobile applications in bringing new services to humans at the same time,the existence of information disclosure,deceive counterfeiting,virus Trojans and so on security risks are also a serious threat to the user's personal information and property security.In this paper,the research on malicious code analysis and detection technology of mobile devices is carried out.Firstly,the causes of mobile malicious code generation and difficult to cure are expounded from two aspects of application open environment and detection and avoidance technology.Then,the common mobile malicious code detection technology is introduced.It includes the detection technology based on signature,the detection technology based on code analysis and the detection technology based on behavior monitoring,and the basic principles and advantages and disadvantages of these three methods are elaborated in detail.
作者 马圣荣 Ma Shengrong(Fuzhou University Zhicheng College,Fuzhou Fujian 350001,China)
出处 《信息与电脑》 2017年第14期24-25,共2页 Information & Computer
关键词 移动设备 恶意代码 检测 特征码 行为监控 mobile device malicious code detection signature behavior monitoring
  • 相关文献

参考文献5

二级参考文献92

  • 1王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. 被引量:22
  • 2苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 3李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 4王珊珊,孔韦韦,张捷.基于计算机变形病毒及其防治现状的探讨[J].计算机与数字工程,2007,35(8):78-81. 被引量:6
  • 5工信部统计分析[EB/OL].[2014-12-25].http://www.miit.gov.cn/n11293472/n11293832/n11294132/n12858447/index.html.
  • 6中华人民共和国工业和信息化部.YD/T 2439-2012移动互联网恶意程序描述格式[S].2012.
  • 7Wang W,Wang X,Feng D W,et al.Exploring PermissionInduced Risk in Android Applications for Malicious Application Detection[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1869-1882.
  • 8Sbirlea D,Burke M G,Guarnieri S,et al.Automatic detection of inter-application permission leaks in Android applications[J].IBM J.RES.&DEV.,2013,57(6):10:1-10:12.
  • 9Moonsamy V,Rong J,Liu S.Mining permission patterns for contrasting clean and malicious android applications[J].Future Generation Computer Systems,2014,36:122-132.
  • 10Mojica I J,Adams B,Nagappan M,et al.A Large-Scale Empirical Study on Software Reuse in Mobile Apps[J].IEEE Software,2014,31(2):78-86.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部