期刊文献+

基于权限的Android应用风险评估方法 被引量:7

Risk assessment method of Android application based on permission
下载PDF
导出
摘要 针对Android权限机制存在的问题以及传统的应用风险等级评估方法的不足,提出了一种基于权限的Android应用风险评估方法。首先,通过对应用程序进行逆向工程分析,提取出应用程序声明的系统权限、静态分析的权限以及自定义的权限,和通过动态检测获取应用程序执行使用到的权限;然后,从具有恶意倾向的组合权限、"溢权"问题和自定义权限三个方面对应用程序进行量性风险评估;最后,采用层次分析法(AHP)计算上述三个方面的权重,评估应用的风险值。对6 245个软件样本进行训练,构建自定义权限数据集和具有恶意倾向的权限组合数据集。实验结果表明,与Androguard相比,所提方法能更精确地评估应用软件的风险值。 Focusing on the problems existing in Android permission mechanism and poor capability of traditional measurement methods of Android software security,a risk assessment method of Android APP based on permission was proposed.Firstly,the system permissions declared by application,the permissions obtained through static analysis and custom permissions were extracted by reverse-engineering analysis of application.At the same time,the permissions used by executing application were extracted through dynamic detection.Secondly,quantitative risk assessment of applications was performed from three aspects:permission combination of hiding malicious intent,“over-privilege”problem and custom permission vulnerability.Finally,the Analytic Hierarchy Process(AHP)evaluation model was adopted to calculate the weights of three aspects above for estimating risk value of application.In addition,custom permission data set and permissions combination dataset with hiding malicious intent were built by training 6 245 software samples collected from application store and VirusShare.The experimental results show that the proposed method can assess risk value of application software more accurately compared with Androguard.
作者 卜同同 曹天杰 BU Tongtong;CAO Tianjie(School of Computer Science and Technology,China University of Mining and Technology,Xuzhou Jiangsu 221116,China)
出处 《计算机应用》 CSCD 北大核心 2019年第1期131-135,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61303263)~~
关键词 Android安全 风险评估 应用权限 量性评估 静态分析 动态检测 Android security risk assessment application permission quantitative assessment static analysis dynamic detection
  • 相关文献

参考文献2

二级参考文献21

  • 1网秦.2013年上半年网秦全球手机安全报告[R/OL].[2013-07-23].http://cn.nq.com/neirong/2013Q2.pdf.
  • 2JIANG X,ZHOU Y.A survey of Android malware[M].New York:Springer,2013:3-20.
  • 3SCHMIDT A D,BYE R,SCHMIDT H G,et al.Static analysis of executables for collaborative malware detection on Android[C]//Proceedings of the 2009 IEEE International Conference on Communications.Piscataway:IEEE Press,2009:631-635.
  • 4BURGUERA I,ZURUTUZA U,NADJM-TEHRANI S.Crowdroid:behavior-based malware detection system for Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York:ACM,2011:15-26.
  • 5CHIANG H S,TSAUR W.Mobile malware behavioral analysis and preventive strategy using ontology[C]//Proceedings of the 2010IEEE Second International Conference on Social Computing.Piscataway:IEEE Press,2010:1080-1085.
  • 6SHABTAI A,ELOVICI Y.Applying behavioral detection on Android-based devices[C]//Proceedings of the Mobile Wireless Middleware,Operating Systems,and Applications.Berlin:Springer,2010,48:235-249.
  • 7Google.Manifest.permission[EB/OL].[2013-11-01].http://developer.android.corn/reference/android/Manifest.permission.html.
  • 8BARRERA D,KAYACIK H G,van OORSCHOT P C,et al.A methodology for empirical analysis of permission-based security models and its application to Android[C]//CCS '10:Proceedings of the 17th ACM Conference on Computer and Communications Security.New York:ACM,2010:73-84.
  • 9ZHOU Y,JIANG X.Dissecting Android malware:characterization and evolution[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy.Washington,DC:IEEE Computer Society,2012:95-109.
  • 10KIRA K,RENDELL L A.The feature selection problem:traditional methods and a new algorithm[C]//AAAI '92:Proceedings of the 10th National Conference on Artificial Intelligence.Palo Alto:AAAI Press,1992:129-134.

共引文献39

同被引文献49

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部