期刊文献+

面向Android第三方库的共谋行为检测

Collusion Behavior Detection Towards Android Third-party Libraries
下载PDF
导出
摘要 第三方库是安卓应用重要的组成部分,应用开发者往往会引入一些具有特定功能的第三方库进行快速开发。针对Android第三方库中存在的共谋风险,提出了面向Android第三方库的共谋行为检测的研究。Android第三方库与应用属于不同的利益体,隐藏在第三方库中的通信行为可以视为应用共谋的一种特殊情况,同样会引发权限提升、组件劫持、性能消耗等恶意行为,这些行为可以引起过多的系统消耗,甚至是引发安全威胁。文中对近些年来国内外学者在该研究领域取得的成果进行了系统总结,给出了研究的共谋定义,并对Android第三方库共谋行为可能产生的风险威胁进行了分析。然后详细介绍了安卓第三方库共谋行为检测的设计方案。针对测试集中的29个第三方库的实验表明,所提设计方案的精确率达到了100%,召回率为89.66%,F-measure值为0.945;同时,本实验还对下载的1 207个第三方库进行了分析,对41个国内著名的第三方库非敏感信息共谋行为导致的资源消耗情况进行了验证。最后,对工作进行了总结,并对未来研究进行了展望。 Third-party library is an important part of Android applications.Application developers often introduce some third-party libraries with specific functions for rapid development.Concerning the risk of collusion in Android third-party libraries,this paper studied the collusion of Android third-party libraries.Android third-party libraries and applications belong to different interests.Communication behaviors hidden in third-party libraries can be considered as a special case of application collusion,and it will also lead to privilege escalation and component hijacking.Furthermore,these behaviors can cause excessive system consumption,and even trigger security threats.This paper presented a systematic survey of existing research achievements of the domestic and foreign researchers in recent years.First,this paper gave the definition of collusion,and analyzed the risks of the collusion behavior in Android third-party libraries.Then,it pre-sented the design of the Android third-party library collusion behavior detection system in detail.For the 29 third-party libraries in the test set,the experiment shows that the accuracy of this design is 100%,the recall rate is 89.66%,and the F-measure value is 0.945.At the same time,the downloaded 1 207 third-party libraries were analyzed.The experiments also verify the resource consumption caused by non-sensitive information collusion behavior of 41 domestic famous third-party libraries.Finally,this paper concluded the work and gave a perspective of the future work.
作者 张婧 李瑞轩 汤俊伟 韩洪木 辜希武 ZHANG Jing;LI Rui-xuan;TANG Jun-wei;HAN Hong-mu;GU Xi-wu(School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China)
出处 《计算机科学》 CSCD 北大核心 2019年第5期83-91,共9页 Computer Science
基金 国家重点研发计划(2016YFB0800402 2016QY01W0202) 国家自然科学基金项目(U1836204 61572221 61433006 U1401258 61502185) 国家社科基金重大项目(16ZDA0092) 广西高等学校高水平创新团队-数字东盟云大数据安全与挖掘技术创新团队资助
关键词 安卓第三方库 敏感路径 组件通信 应用共谋 Android third-party library Sensitive path Inter-component communication Application collusion
  • 相关文献

参考文献2

二级参考文献10

  • 1傅建明,李鹏伟,易乔,黄诗勇.Android组件间通信的安全缺陷静态检测方法[J].华中科技大学学报(自然科学版),2013,41(S2):259-264. 被引量:9
  • 2W. Enck, M. Ongtang, P. McDaniel. On Lightweight Mobile Phone Application Certification[C]. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ' 09, 2009.
  • 3David Barrera, H. G fines Kayaclk, P.C. van Oorschot, Anil Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android[C]. In Proceedings of the 18th ACM Conference on Computer and Communications Security, 2010.
  • 4A. P. Felt, E. Chin, S. Hanna, D. Song, D. Wagner. Android Permissions Demystified[C]. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ' 11, October 2011.
  • 5Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. A formal model to analyze the permission authorization and enforcement in the Android framework[C]. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM '10, 2010. 944-951.
  • 6Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto,Kazuhide Fukushima, Toshiaki Tanaka. A small but non-negligible aw in the Android permission scheme[C]. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and NIetwnrks, 2010. 107-113.
  • 7Y. Zhou, Z. Wang, W. Zhou, X. Jiang. Hey, You, Get Off My Market: Detecting Malicious Apps in Alternative Android Markets[C]. In Proceedings of the 16th Network and Distributed System Security Symposium, 2012.
  • 8Y. Zhou, X. Zhang, X. Jiang, VW Freeh. Taming information- stealing Smartphone applications (on Android)[C]. In Proceedings of the 4th International Conference on Trust and Tmstworthy Computing, 2011.67.
  • 9L. Davi, A. Dmitrienko, A.-R. Sadeghi, M. Winandy. Privilege escalation attacks on android[C], In Proceedings of the 13th international conference on Information security, 2011. 346-360.
  • 10张玉清,王凯,杨欢,方喆君,王志强,曹琛.Android安全综述[J].计算机研究与发展,2014,51(7):1385-1396. 被引量:94

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部