期刊文献+

一种动态监控恶意APK应用的移动操作系统 被引量:1

SecuDroid: A mobile operating system to dynamic ally monitor malicious APK's application
下载PDF
导出
摘要 在原生Android系统(Google公司发布,没有经过第三方修改的安卓系统)基础上,研究采用数据流追踪技术检测用户敏感信息是否被泄露或滥用,在应用层、系统层以及内核层动态监控和拦截敏感行为。最后设计了SecuDroid移动操作系统,并通过实验验证SecuDroid可以有效检测隐私数据的使用及监控恶意行为。 Based on original Android system (published by Google, and not be modified by the third party), in one place, to research how to detect whether the user's sensitive information is leaked or abused based on data flow tracking technology; in the other place, to research how to monitor and intercept sensitive behavior through dynamic monitoring technologies from the application layer, system layer and inner nuclear layer. Then new android operation system called SeeuDroid is designed, which has been certified to detect the use of privacy data and monitor malicious behavior effectively by experiments.
出处 《西北大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第3期373-378,共6页 Journal of Northwest University(Natural Science Edition)
基金 教育部科学技术研究重点基金资助项目(211181) 教育部博士点基金资助项目(20106101110018) 国家科技支撑计划课题基金资助项目(2013BAK01B02) 国家自然科学基金资助项目(61170218 61272461 61202393) 陕西省科技攻关基金资助项目(2011K06-07 2012K06-17) 陕西省科技计划基金资助项目(2011K06-09) 陕西省自然科学基础研究计划基金资助项目(2012JQ8049) 陕西省教育厅服务地方专项计划基金资助项目(2013JC07)
关键词 Android安全 恶意软件 数据传播分析 行为监控 Android security malware data propagation analysis behavior monitoring
  • 相关文献

参考文献11

  • 1MILLER C.Mobile attacks and defense[J].Security & Privacy,IEEE,2011,9(4):68-70.
  • 2IDIKA N,MATHUR A P.A survey of malware detection techniques[R].USA:Department of Computer Science,Purdue University,2007.
  • 3ZHOU Y,JIANG X.Dissecting android malware:Characterization and evolution[C]//2012 IEEE Symposium on Security and Privacy (SP),San Francisco Bay Area,California:IEEE,2012:95-109.
  • 4SCHMIDT A D,BYE R,SCHMIDT H G,et al.Static analysis of executables for collaborative malware detection on android[C]//ICC'09.IEEE International Conference on Communications,Dresden:IEEE,2009:1-5.
  • 5SHABTAI A.Malware Detection on Mobile Devices[C]//2010 Eleventh International Conference on Mobile Data Management (MDM),Taipei:IEEE,2010:289-290.
  • 6SCHMIDT A D,SCHMIDT H G,CLAUSEN J,et al.Enhancing security of linux-based android devices[C]//Linux Kongress-15th International Linux System Technology Conference.Hamburg:University of Hamburg,2008.
  • 7CHIANG H S,TSAUR W J.Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology[C]//2010 IEEE Second International Conference on Social Computing (SocialCom),Minneapolis:IEEE,2010:1080-1085.
  • 8ZHU D Y,JUNG J,SONG D,et al.TaintEraser:protecting sensitive data leaks using application-level taint tracking[J].ACM SIGOPS Operating Systems Review,2011,45 (1):142-154.
  • 9ENCK W,GILBERT P,CHUN B G,et al.Taint-Droid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]//Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation,Vancouver:ACM,2010:1-6.
  • 10SHAKYA N.Privacy Issues of Antivirus Apps for Smartphones[C]//The 12th Winona Computer Science Undergraduate Research Symposium,Winona:Winona State University,2012:17.

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部