期刊文献+

基于逆向工程的Android恶意行为检测方法 被引量:5

Android Malicious Behavior Detection based on Reverse Engineering
下载PDF
导出
摘要 由于Android系统应用市场的特性导致恶意软件传播迅速,对用户的手机乃至个人隐私造成了十分巨大的危害。本文首先介绍了Android应用的逆向技术,然后分析了恶意代码采用的多种Android代码隐藏技术及隐私获取的代码特征。针对这些情况,本文基于Android的逆向工程提出了一种静态检测和动态检测相结合的恶意行为检测方法,可以更加有效的检测代码中的恶意行为。最后通过对Android样本应用的分析表明此方法的可行性与有效性。 The characteristics of application market for Android system would usually lead to the rapid spread of the malwares,thus cause tremendous harm to the user's mobile phone and personal privacy. Firstly,the reverse technology of Android application is described,and then the code- behind technology used by Android malwares and the code characteristics of privacy access are analyzed.In light of this,a malicious behavior detection method based on the reverse engineering of Android and in combination with static detection and dynamic detection is proposed,and this method could detect malicious behavior more effectively. Finally,the analysis of Android sample application indicates the feasiblility and effectiveness of this method.
出处 《信息安全与通信保密》 2015年第4期83-87,共5页 Information Security and Communications Privacy
基金 中国信息安全测评中心科研项目资助(No.CNITSEC-KY-2013-009/2)
关键词 ANDROID 恶意代码 代码隐藏 行为检测 Android malicious code code-behind behavior detection
  • 相关文献

参考文献8

  • 1Yanjin Zhou,Xuxian Jiang.Dissecting Android Malware:Characterization and Evolution. 2012 IEEE Symposium on Security and Privacy . 2012
  • 2MICHAEL GRACE,WU ZHOU,XUXIAN JIANG,AHMAD-REZE SADEGHI.Unsafe Exposure Analysis of Mobile In-App Advertisements. the 5 th ACM Conference on Security and Privacy in Wireless and Mobile Networks . 2012
  • 3Grégoire Jacob,Hervé Debar,Eric Filiol.Behavioral detection of malware: from a survey towards an established taxonomy[J]. Journal in Computer Virology . 2008 (3)
  • 4William E,Peter G,Byung-Gon C,Landon PC,Jaeyeon J,Patrick M,Anmol NS.Taint Droid:An information-flow tracking system for realtime privacy monitoring on smartphones. USENIX Conference on Operating Systems Design and Implementatio . 2010
  • 5冯博,戴航,慕德俊.Android恶意软件检测方法研究[J].计算机技术与发展,2014,24(2):149-152. 被引量:13
  • 6杨广亮,龚晓锐,姚刚,韩心慧.一个面向Android的隐私泄露检测系统[J].计算机工程,2012,38(23):1-6. 被引量:25
  • 7贾菲,刘威.基于Android平台恶意代码逆向分析技术的研究[J].信息网络安全,2012(4):61-63. 被引量:20
  • 8秦中元,徐毓青,梁彪,张群芳,黄杰.一种Android平台恶意软件静态检测方法[J].东南大学学报(自然科学版),2013,43(6):1162-1167. 被引量:11

二级参考文献28

  • 1Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 2Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 3Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 4Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 5Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 6Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 7Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 8Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 9Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.
  • 10Gilbert P,Chun B,Cox L P,et al.Vision:Automated SecurityValidation of Mobile Apps at App Markets[C]//Proc.of MCS’11.Washington D.C.,USA:[s.n.],2011.

共引文献62

同被引文献25

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2IDC, Smartphone OS market share, 042014 [ R/OLI. 2014. http ://www. idc. com/prodserv/smartphone-os-market-share, jsp.
  • 3Svajcer V. Sophos mobile security threat report[R/OL]. 2014. http://www, sophos, com/en - us/medialibrary/PDFs/ other/sophos-mobilesecurity-threat -report. ashx.
  • 4Barrera D, Kayacik H. A methodology for empirical analysis of permission-based security models and its application to an- droid[ C]//Proceedings of the 17th ACM conference on com- puter and communications security. [ s. 1. ] : ACM, 2010 : 73 - 84.
  • 5Finickel E, Lahmadi A. Empirical analysis of Android logs u- sing self-organizing maps[ C]//Proc of IEEE international conference on communications. [ s. 1. ] : IEEE, 2014:1802 - 1807.
  • 6Zhou Yajin, Jiang Xuxian. Dissecting Android malware:char- acterization and evolution [ C ]//Proc of IEEE symposium on security and privacy. San Francisco ~ CA : IEEE, 2012 : 95 - 109.
  • 7Kohonen T. Self- organizing maps [ M ]. 3rd ed. [ s. 1. ] : Springer ,2001.
  • 8郑炜,沈文,张英鹏.基于改进朴素贝叶斯算法的垃圾邮件过滤器的研究[J].西北工业大学学报,2010,28(4):622-627. 被引量:27
  • 9芮小平,张立强.基于SOM的多维信息可视化研究[J].应用基础与工程科学学报,2011,19(3):379-388. 被引量:8
  • 10胡文君,赵双,陶敬,马小博,陈亮.一种针对Android平台恶意代码的检测方法及系统实现[J].西安交通大学学报,2013,47(10):37-43. 被引量:21

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部