期刊文献+

面向敏感信息监测的抢红包神器

Red packets grabbing artifact for sensitive information monitoring
下载PDF
导出
摘要 以微信红包为例,对微信敏感信息的监测进行研究,提出了一种微信红包监测方法,并设计了一种新型抢红包神器(简称“抢红包神器”)。该神器通过AccessibilityService辅助类监听微信的所有事件,通过关键字遍历所有的View节点,查找关键节点,通过AccessibilityService辅助类的辅助功能进行模拟点击,完成红包的实时监测和用户随时领取。相较于其他的红包神器的监测方法,该方法不仅完成了快速抢红包的功能,还能够通过延迟领取来绕开监测机制,保护账号安全,是一种新型的有应用价值的红包监测方法。通过该红包监测方法,可以对微信中的敏感信息进行监测,净化网络环境。 Taking Wechat red packets as an example,the monitoring of Wechat sensitive information is studied,a new monitoring method is proposed,and a new grabbing artifact is designed for Wechat red packets.This artifact monitors all events of Wechat through Accessibilityservice auxiliary class,by traversing all view nodes to find key nodes with keywords.The auxiliary function of Accessibilityservice can simulate a click through auxiliary class to complete real-time monitoring of red packets and collection by users at any time.After comparative verification,it is found that this method not only completes the function of quickly grabbing red packets,but also bypasses the monitoring mechanism and protects the security of the account by delaying the collection,which is a new type of red envelope monitoring method with application value.By using this method,sensitive information in Wechat can be monitored to purify the network environment.
作者 景悟 康海燕 黄渝轩 JING Wu;KANG Haiyan;HUANG Yuxuan(School of Information Management,Beijing Information Science&Technology University,Beijing 100192,China)
出处 《北京信息科技大学学报(自然科学版)》 2020年第5期71-75,96,共6页 Journal of Beijing Information Science and Technology University
基金 教育部人文社科项目(20YJAZH046) 北京信息科技大学科研水平提高项目(5211910933)。
关键词 敏感信息 AccessibilityService 模拟点击 sensitive information AccessibilityService simulate a click
  • 相关文献

参考文献5

二级参考文献316

  • 1姚昱旻,刘卫国.Android的架构与应用开发研究[J].计算机系统应用,2008,17(11):110-112. 被引量:281
  • 2傅建明,李鹏伟,易乔,黄诗勇.Android组件间通信的安全缺陷静态检测方法[J].华中科技大学学报(自然科学版),2013,41(S2):259-264. 被引量:9
  • 3Egham. Gartner says sales of smartphones grew 20 percent in third quarter of 2014 [EB/OL]. [2015-06-01]. http:// www. gartner, com/newsroom/id/2944819.
  • 41991 T.Appfigures:2014年Googleplay增加新应用数量首次超过Appstore[EB/OL].[2015—06—01].http://www.199it.com/archives/321519.htm.
  • 5TheHackerNews. Zero-day smartphone vulnerability exposes location and user data [EB/OL]. [2015 06-01]. bttp:// t hehackenews, com/2012/02/zero-day-smartphone-vulnerability. html.
  • 6Sehlegel R, Zhang K, Zhou X, et al. Soundeomber: A stealthy and context-aware sound trojan for smartphones [C] //Proc of the 18th Network and Distributed System Security. San Diego: NDSS, 2011:17-33.
  • 7Nerney C. Sneaky "pileup" malware can exploit android upgrades, researchers say [EB/OL]. [2015-06-01]. http:// www. eiteworld, com/article/2114420/mobile-byod/android- pileup-malware, html.
  • 8Xing L, Pan X, Wang R, et al. Upgrading your android, elevating my malware: Privilege escalation through mobile os updating [C] //Proc of 2014 IEEE Syrup on Security and Privacy (SP). Piscataway, NJ.. IEEE, 2014: 393-408.
  • 9Jia Jack.“黑暗潜伏者”——手机病毒新型攻击方式[EB/OL].2014[2015—06-01].http://blog.csdn.net/androidsecurity/article/detans/41207959.
  • 10Alephzain. Framaroot, a one-click apk to root some devices [EB/OL]. [2015-06-01]. http://forum, xda-developers, corn/ apps/framaroot/root- framaroot-one-click-apk-to-root-t2130276.

共引文献141

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部