期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Communication-Based Attacks Detection in Android Applications 被引量:2
1
作者 Chuan Ma Tao Wang +3 位作者 Limin Shen Dongkui Liang Shuping Chen Dianlong You 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期596-614,共19页
The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method... The Android operating system provides a rich Inter-Component Communication(ICC) method that brings enormous convenience. However, the Android ICC also increases security risks. To address this problem, a formal method is proposed to model and detect inter-component communication behavior in Android applications. Firstly,we generate data flow graphs and data facts for each component through component-level data flow analysis.Secondly, our approach treats ICC just like method calls. After analyzing the fields and data dependencies of the intent, we identify the ICC caller and callee, track the data flow between them, and construct the ICC model. Thirdly,the behavior model of Android applications is constructed by a formal mapping method for component data flow graph based on Pi calculus. The runtime sensitive path trigger detection algorithm is then given. Communicationbased attacks are detected by analyzing intent abnormity. Finally, we analyze the modeling and detection efficiency,and compare it with relevant methods. Analysis of 57 real-world applications partly verifies the effectiveness of the proposed method. 展开更多
关键词 ANDROID inter-component COMMUNICATION intents COMPONENT HIJACKING attack DETECTION
原文传递
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security 被引量:3
2
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 CSCD 2020年第1期356-373,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation Layered security Element-layer obfuscation Component-layer obfuscation inter-component obfuscation Application-layer obfuscation
原文传递
DroidEcho:an in-depth dissection of malicious behaviors in Android applications 被引量:1
3
作者 Guozhu Meng Ruitao Feng +2 位作者 Guangdong Bai Kai Chen Yang Liu 《Cybersecurity》 2018年第1期126-142,共17页
A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency.However,it is still far from expectation to describe attacks precisely on the Android platform.In addition,new ... A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency.However,it is still far from expectation to describe attacks precisely on the Android platform.In addition,new features on Android,such as communication mechanisms,introduce new challenges and difficulties for attack detection.In this paper,we propose abstract attack models to precisely capture the semantics of various Android attacks,which include the corresponding targets,involved behaviors as well as their execution dependency.Meanwhile,we construct a novel graph-based model called the inter-component communication graph(ICCG)to describe the internal control flows and inter-component communications of applications.The models take into account more communication channel with a maximized preservation of their program logics.With the guidance of the attack models,we propose a static searching approach to detect attacks hidden in ICCG.To reduce false positive rate,we introduce an additional dynamic confirmation step to check whether the detected attacks are false alarms.Experiments show that DROIDECHO can detect attacks in both benchmark and real-world applications effectively and efficiently with a precision of 89.5%. 展开更多
关键词 Semantic attack model Android malware detection inter-component communication graph Privacy leakage
原文传递
Layered obfuscation:a taxonomy of software obfuscation techniques for layered security
4
作者 Hui Xu Yangfan Zhou +1 位作者 Jiang Ming Michael Lyu 《Cybersecurity》 2018年第1期1030-1047,共18页
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom... Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements. 展开更多
关键词 Software obfuscation Layered security Element-layer obfuscation Component-layer obfuscation inter-component obfuscation Application-layer obfuscation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部