期刊文献+

Android移动应用检测研究 被引量:8

ANDROID MOBILE APPLICATION DETECTION
下载PDF
导出
摘要 随着Android操作系统在智能设备上的广泛应用,Android应用的安全性检测成为了当前关注的重点。为了从Android应用程序中检测出恶意软件,研究Android应用静态分析技术、动态分析技术及基于机器学习的Android应用检测技术。提出一个通用的恶意软件检测框架。该框架通过逆向工程从Android应用中提取(安全应用、受感染应用)特征信息并建立关键信息特征库。通过机器学习建立检测模型,采用分类检测技术完成检测。通过该检测框架,可在软件安装前执行应用安全评估,其检测正确率高,并具有良好的扩展性,为Android应用的安全性检测提供参考。 With the wide application of the Android operating system in smart devices,the security detection of Android applications has become the focus of current attention.In order to detect malware from Android applications,this paper studied Android application static analysis,dynamic analysis and Android application detection technology based on machine learning,and proposed a general framework for malware detection.The framework extracted feature information from Android applications(secure applications,infected applications)by reverse engineering and established key information feature database.We established the detection model through machine learning,and completed the detection through classification detection.The framework can perform application security assessment before software installation.It has high detection accuracy and good expansibility.It provides a reference for the security detection of Android application.
作者 刘玮 李蜀瑜 Liu Wei;Li Shuyu(College of Mathematics and Computer Science, Chongqing Normal University Foreign Trade and Business College, Chongqing 410520, China;College of Computer Science and Technology, Shaanxi Normal University, Xi'an 710062, Shaanxi, China)
出处 《计算机应用与软件》 北大核心 2019年第6期322-326,共5页 Computer Applications and Software
基金 重庆师范大学涉外商贸学院校级教改项目(JG2016015)
关键词 安卓 安全性检测 静态分析 动态分析 机器学习 Android Security detection Static analysis Dynamic analysis Machine learning
  • 相关文献

参考文献4

二级参考文献157

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014.
  • 3Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539.
  • 4Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16].
  • 5Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618].
  • 6La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028].
  • 7Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3].
  • 8Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29].
  • 9Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf.
  • 10Burns J. Developing secure mobile applications for Android. 2008. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/ isec securing_android apps .pdf.

共引文献120

同被引文献79

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部