期刊文献+

基于动静态结合分析的Android恶意应用多重检测模型

Android malicious application multi-detection model based on dynamic and static combination analysis
下载PDF
导出
摘要 文章通过对大量Android恶意软件的研究,提出并设计一种Android恶意应用综合检测模型。模型中包含动态监测和静态分析两种恶意应用识别技术,并结合机器学习算法,对Android应用中可能存在的恶意代码攻击、漏洞利用、隐私泄露3种问题进行了研究并设计出解决方案。 This paper proposes and designs a detection model for Android malicious applications through the research of a large number of Android malware.The model includes two kinds of malicious application identification technologies:dynamic monitoring and static analysis.Combined with machine learning algorithms,this paper studies the malicious code attacks,exploits and privacy leaks in Android applications and designs solutions.
作者 陈明翔 解梦飞 张钦尧 刘俊 Chen Mingxiang;Xie Mengfei;Zhang Qinyao;Liu Jun(College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China)
出处 《无线互联科技》 2018年第22期45-48,共4页 Wireless Internet Technology
关键词 ANDROID 恶意软件 动态监测 静态分析 机器学习 漏洞扫描 隐私泄露 Android malware dynamic monitoring static analysis machine learning vulnerability scanning privacy disclosure
  • 相关文献

参考文献3

二级参考文献19

  • 1Flame[EB/OL]. http://en.wikipedia.org/wiki/Flame_(malware), 2015-6.
  • 2Chen X, Andersen J, Mao Z M, et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware[C]//Dependable Systems and Networks With FTCS and DCC. 2008. DSN 2008. IEEE International Conference on. IEEE, 2008:177-186.
  • 3Willems C, Holz T, Freiling I=. Toward automated dynamic malware analysis using cwsandhox[J]. IEEE Security & Privacy, 2007 (2): 32-39.
  • 4Bayer U, Kruegel C, Kirda E. TTAnalyze: A tool for analyzing malware[M]. NA, 2006.
  • 5Anubis[EB/OL], https://anubis.iseclab.org/, 2015-6.
  • 6Dinaburg A, Royal P, Sharif M, et al. Ether: malware analysis via hardware virtualization extensions[C]//Proceedings of the 15th ACM conference on Computer and communications security. ACM, 2008: 51-62.
  • 7Smith J, Nair R. Virtual machines: versatile platforms for systems and processes[M]. Elsevier, 2005.
  • 8x86 virtualization[EB/OL], http://en.wikipedia.org/wiki/X86 virtualization, 2015-6.
  • 9Xen[EB/OL]. http://www.xenproject.org/, 2015-6.
  • 10Neugschwandtner M, Platzer C, Comparetti P M, et al. Danubis- dynamic device driver analysis based on virtual machine introspection[M]// Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2010:41-60.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部