期刊文献+

Android恶意软件检测方法研究

Research on Android Malware Detection Method
下载PDF
导出
摘要 Android操作系统所秉承的开放性及其目前占有的庞大市场份额,使得其安全性备受关注,本文对Android的系统架构进行了介绍,分析了Android面临的三类安全威胁和四种受到的攻击方式,在分析Android三大安全机制的基础上,对恶意软件的分析检测技术和判定技术进行了研究。 The openness of the Android operating system and its huge market share have made its security much concerned. This paper introduces the system architecture of Android, analyzes the three types of security threats faced by Android and four kinds of Based on the analysis of Android’s three major security mechanisms, the attack detection method and the judgment technology of malware are studied.
作者 张洋 ZHANG Yang(Jiangsu Union Vocational and Technical College Xuzhou Economic and Trade Branch,Xuzhou Jiangsu 221004)
出处 《数字技术与应用》 2018年第11期166-166,168,共2页 Digital Technology & Application
关键词 ANDROID 恶意软件 安全机制 分析监测 Android malware security mechanism analysis and monitoring
  • 相关文献

参考文献2

二级参考文献152

  • 1Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 2Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 3Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 4Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 5La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 6Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 7Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 8Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.
  • 9Burns J. Developing secure mobile applications for Android. 2008. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/ isec securing_android apps .pdf.
  • 10Enck W, Ongtang M, McDaniel P. Understanding Android security. IEEE Security & Privacy, 2009,7(1):50-57. [doi: 10.1109/MSP 2009.26].

共引文献179

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部