期刊文献+

基于Android安全机制的权限检测系统 被引量:29

Permission detection system based on android security mechanism
下载PDF
导出
摘要 针对Android开源性带来的手机隐私信息泄露的问题,通过采用获取访问权限的方法,建立了基于Android安全机制的权限检测系统。该系统综合利用了特征选择算法、反编译及XML(extensible markup language)文件解析来获取权限信息.通过设定筛选机制来筛选出访问敏感权限的程序和APK(android package)文件。手机用户通过该系统不仅可以检测已安装软件,还可以检测未安装的APK文件,从而更全面的保证手机用户信息的安全。实验结果表明了该系统的可行性和有效性。 For the problem that phone user's privacy information leakage, the permission detection system based on android se curity mechanism is established by using the method of acquiring permissions. Feature selection algorithm, decompilation, XML file analysis are all considered during the acquirement of permission information in this system. In order to screen out the pro grams that access to sensitive permissions, specific screening mechanism is set up. Through this system, phone users can not on ly detect the installed softwares, but olso detect not installed APK files, so as to more fully guarantee user's information securi ty. Experimental results verify the feasibility and validity of the system.
作者 闫梅 彭新光
出处 《计算机工程与设计》 CSCD 北大核心 2013年第3期854-858,共5页 Computer Engineering and Design
基金 山西省留学基金项目(2009-28) 山西省自然科学基金项目(2009011022-2)
关键词 安卓 安卓系统控制文件 权限 安全机制 权限检测系统 Android AndroidManifest. xml permission security mechanism permission detection system
  • 相关文献

参考文献6

  • 1邵艳沽.Android操作系统移植及应用研究[D].湖南:湖南大学,2011.
  • 2Enck W, Ongtang M, McDaniel P. On lightweight mobile phone application certification [C] //Proceedings of the 16th ACM conference on Computer and Communications Security. USA: ACMPress, 2009: 235-245.
  • 3Mohammad Nauman, Sohail Khan, Xinwen Zhang. Apex: Extending android permission model and enforcement with user- defined runtime constraints [C] //Proceedings of the 5th ACM Symposium on Information, Computer and Communications Se- curity. USA: ACM, 2010: 328-332.
  • 4Francesco Di Cerbo, Andrea Girardello. Detection of malicious applications on android OS [C] //Computational Forensics, GRE: Springer, 2011: 138-149.
  • 5Vidas T, Christin N, Cranor L. Curbing android permission creep [C] //Oakland, CA, USA: Proceedings of the Web 2.0 Security and Privacy Workshop, 2011.
  • 6Asaf Shabtai, Yuval Elovici. Applying behavioral detection on android-based devices [J]. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, 48 (5): 235-249.

同被引文献208

  • 1杨博,唐祝寿,朱浩谨,沈备军,林九川.基于静态数据流分析的Android应用权限检测方法[J].计算机科学,2012,39(S3):16-18. 被引量:8
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3陆伟峰.监视和控制网络出口BT流量——北京伟世盾安公司PU网络流量优化服务器的监控方案[J].计算机安全,2005(2):40-42. 被引量:5
  • 4符易阳,周丹平.Android安全机制分析[C]//第26次全国计算机安全学术交流会论文集.2011.
  • 5李刚疯狂Android讲义【M].北京:电子工业出版社,2013.
  • 6张中文,雷灵光,王跃武.AndroidPermission机制的实现与安全分析[c]//第27次全国计算机安全学术交流会论文集.出版地不详:出版者不祥,2012:3-6.
  • 7赵海军.解决手机隐私泄露刻不容缓[N].中国计算机报,2012-02-27(004).
  • 8W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information - flow tracking nsystem for realtime privacy monitoring on smartphones[ C ]. In Proc. 9th USENIX Symposium on Operating Systems Design and Implementation, 2010. To appear.
  • 9T. Vennon and D. Stroop. Threat analysis of the android market[ EB/OL]. 2010. http ://www. globahhreatcenter. com/wp - content/uploads/2010/06/ Android - Market - Threat - Analysis - 6 - 22 - 10 - vl. pdf.
  • 10Wook Shin, Shlnsaku Ydyomoto, Kazuhide Fukushima, Toshlaki Tanaka. A formal model to analyze the permis- sion authorization and enforcement in the Android frame- work[C]. In Proceedings of the 2010 IEEE Second In- ternational Conference on Social Computing, SOCIAL- COM 10, 2010. 944-951.

引证文献29

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部