期刊文献+

基于Android权限机制的应用安全检测方法 被引量:2

Application security detection based on Android access permission mechanism
下载PDF
导出
摘要 针对Android应用软件安全性问题,提出一种基于云端协同框架的轻量级安全检测方法。云端定义权限及权限组合的威胁度,通过分析不同类别的主流应用得到权限概率;终端以云端的计算结果为基础,对预安装的应用进行检测和威胁度计算;终端上传恶意应用的应用签名到云端,周期性地从云端下载安全信息文件。以视频播放类应用为例,选取用户数量超过10万的30个应用进行实验,成功检测到两个威胁度较高的应用,验证了该方案的有效性。 For the security problem of Android applications,a lightweight security detection method based on cloud collaboration architecture was proposed.In the cloud,the threat degrees of permissions and combinations were defined,and permission probabilities were obtained through the statistical analysis of different categories of mainstream applications.On a terminal device,the threat degrees of applications were calculated with the results from the cloud.The signatures of malicious applications detected were uploaded to the cloud,and the security information file was periodically downloaded from the cloud.For an experiment,thirty video playback applications with more than 100000 users were selected and two applications with a high threat degree were successfully detected.Experimental results verify the validity of the method.
出处 《计算机工程与设计》 北大核心 2016年第1期42-45,64,共5页 Computer Engineering and Design
基金 国家科技支撑计划课题基金项目(2012BAH73F01) 中国科学院先导专项课题基金项目(XDA06040501)
关键词 ANDROID平台 访问权限 权限组合 权限概率 应用威胁度 云端协同 Android platform access permission permissions combination permission probability application threat level cloud collaboration
  • 相关文献

参考文献13

  • 1Shabtai A,Fledel Y,Kanonov U,et al.Google android:A comprehensive security assessment[J].IEEE Security and Privacy,2010,8(2):35-44.
  • 2Shabtai A,Fledel Y,Kanonov U,et al.Google android:A state-of-the-art review of security mechanisms[J].arXiv Preprint arXiv,2009:0912.5101.
  • 3杨珉,王晓阳,张涛,张建军.国内Android应用商城中程序隐私泄露分析[J].清华大学学报(自然科学版),2012,52(10):1420-1426. 被引量:19
  • 4乜聚虎,周学海,余艳玮,吴志忠.Android安全加固技术[J].计算机系统应用,2011,20(10):74-77. 被引量:20
  • 5Smalley S,Craig R.Security enhanced(se)android:Bringing flexible mac to android[C]//20th Annual Network and Distributed System Security Symposium,2013.
  • 6Lange M,Liebergeld S,Lackorzynski A,et al.L4Android:A generic operating system framework for secure smartphones[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices,2011:39-50.
  • 7Shekhar S,Dietz M,Wallach DS.Adsplit:Separating smartphone advertising from applications[J].CoRR,abs/1202.4030,2012.
  • 8Pearce P,Felt AP,Nunez G,et al.Addroid:Privilege separation for applications and advertisers in android[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security,2012:71-72.
  • 9Zhou W,Zhou Y,Jiang X,et al.Detecting repackaged smartphone applications in third-party android marketplaces[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy,2012:317-326.
  • 10Ongtang M,McLaughlin S,Enck W,et al.Semantically rich application-centric security in android[J].Security and Communication Networks,2012,5(6):658-673.

二级参考文献19

  • 1Schmidt AD, Schmidt HG, Batyuk L, Clausen JH, Camtepe SA, Albayrak S, Yildizli C. Smartphone malware evolution revisited: Android next target? Proc. of the 4th IEEE International Conference on Malicious and Unwanted Software. 2009. 1-7.
  • 2Android Open Source. http://source.android.com.
  • 3Android Developers. http://androidappdocs.appspot.com/index.html.
  • 4网秦安全播报.http://virus.nctqin.com/android/.
  • 5凤凰网.2012年中国智能手机市场趋势观察研究预测报告[Z/OL].(2012-03-21),http://tech.ifeng.com/digi/special/wpchina/content-3/detail_2012_03/21/13331085_0.shtml.
  • 6网秦.2012年第一季度全球Android手机安全报告[Z/OL].(2012-04-19),http://news.jschina.com.cn/system/2012/04/19/013174893.shtml.
  • 7中国创新网.2012年第一季度全球智能手机调查报告[Z/OL].(2012-05-03),http://www.chinahightech.com/html/737/2012/0504/112400.htm.
  • 8和讯网.2012年第一季度中国智能手机市场研究报告(简版)[Z/OL].(2012-05-02),http://tech.hexun.com/2012-05-02/140974981.html.
  • 9腾讯科技.解析国内Android应用市场竞争出路[Z/OL].(2011-12-01),http://tech.qq.com/a/20111201/000352.htm.
  • 10Google:Android Developers Website.Android and security[Z/OL].(2012-02-21),http://googlemobile.blogspot.com/2012/02/android-and-security.html.

共引文献42

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部