期刊文献+

基于安卓系统的手机恶意软件提权漏洞研究

Research on Mobile Phone Malware Elevation Based on Android System
下载PDF
导出
摘要 随着互联网技术的发展,手机在人们日常生活中扮演着越来越重要的角色,安卓系统手机软件也越来越多,但手机应用软件漏洞也越来越严重。部分不法分子利用软件漏洞从事非法行为,对用户造成了较大影响。笔者主要研究了基于安卓系统的手机恶意软件提权漏洞发现和防护,通过分析安卓系统常见的可利用漏洞类型,分析安卓系统手机软件提权漏洞,提出了手机用户的防护应对措施。 With the development of Internet technology,mobile phones play an increasingly important role in people's daily life.Android mobile software is also increasing,but the vulnerabilities of mobile application software are becoming more and more serious.Some criminals take advantage of software vulnerabilities to engage in illegal acts,which has a greater impact on users.The author mainly studies the discovery and protection of mobile malware privilege vulnerabilities based on Android system.By analyzing the common types of exploitable vulnerabilities in Android system,the author analyses the privilege vulnerabilities of mobile phone software in Android system,and puts forward the protection measures for mobile phone users.
作者 王硕锋 Wang Shuofeng(Nanjing University of Aeronautics and Astronautics,Nanjing Jiangsu 211100,China)
出处 《信息与电脑》 2019年第3期218-220,共3页 Information & Computer
关键词 安卓系统 提权漏洞 应对措施 Android system empowerment vulnerability countermeasures
  • 相关文献

参考文献3

二级参考文献27

  • 1李恺,陈浩.GSM手机的病毒威胁[J].信息安全与通信保密,2005(7):226-228. 被引量:8
  • 2Neal Leavitt. Malicious Code Moves to Mobile Devices[J]. Computer', 2000, 33(12): 16-]9.
  • 3B. A. Grimes. M&licious Mobile Code: Virus Protection for Windows[M], O'Beilly Medi&, 2001 .
  • 4刘一静,孙莹,蔺洋.基于手机病毒攻击方式的研究[J].信息安全与通信保密,2007,29(12):96-98. 被引量:17
  • 5Aleksandrina Kovacheva. Efficient code obfuscation for Android[J]. Communications in Computer and Informa- tion Science, 2013, 409: 104-119.
  • 6Patrick Schulz. Android security analysis challenge: tam- pering Dalvik bytecode during runtime [ EB/OL]. Blue- boxSec, 2013. https: // bluebox, com/technical/android- security-analysis-challenge-tampering-dalvik-bytecode-dur- ing-runtime.
  • 7Bill Horne, Lesley Matheson, Casey Sheehan, et al. Dynamic self-checking techniques for improved tamper resistance[J]. Security and Privacy in Digital Rights Management, 2002, 2320: 141-159.
  • 8Shamir A. How to share a secret[ J]. Communications of the ACM, 1979, 24(11) : 612-613.
  • 9Google. Bouncer[Z/OL]. (2012-02-18). http://googlemobile.blogspot.com/2012/02/android-and-security.html.
  • 10Felt A P, Finifter M, Chin E, et al. A survey of mobile malware in the wild[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11). Chicago, USA:ACM, 2011:1-14.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部