期刊文献+

一种动态监测安卓应用程序的方法 被引量:2

A Method for Dynamically Monitoring Android Applications
下载PDF
导出
摘要 针对安卓应用程序在终端用户未知的情况下获取系统服务的问题,提出了动态监测应用程序获取系统服务的方法。首先,检查应用程序是否存在第三方库,如存在,则检查第三方库中是否存在敏感函数。如果不存在敏感函数,就将应用程序安装到监测系统,实施对应用程序获取系统服务的实时监测。实验结果表明,该方法在能够避免恶意应用程序对监测系统进行破坏的前提下,可以实时监测到应用程序来自Java层或是本地层对系统服务的调用,而且该方法的实现对时间的开销也在可接受的范围内。 In order for Android application to acquire system service without knowing their terminal user,we proposed the dynamic monitoring method. First,we monitor whether the Android applications have the third libraries;if yes,we monitor whether the third libraries have sensitive function. If the sensitive function do not exist,the Android applications are installed into a certain Android system whose call function has been hooked,thus monitoring in real time the applications' acquisition of system services. The experimental results show that the dynamic monitoring method can monitor the applications' acquisition of their system services called by both the Java layer and the local layer under the precondition that the damage to the monitoring system by an ill-intentioned application can be avoided. Besides,the overhead of the dynamic monitoring method for Android applications is acceptable.
作者 蒋煦 张慧翔 慕德俊 Jiang Xu Zhang Huixiang Mu Dejun(School of Automation, Northwestern Polytechnical University, Xi'an 710072, China)
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2016年第6期1074-1081,共8页 Journal of Northwestern Polytechnical University
基金 国家自然科学基金(61672433)资助
关键词 应用程序编程接口 网络安全 JAVA语言 实时系统 数据安全 第三方库 挂钩子 系统服务调用 Linux 安卓应用程序 动态监测 application programming interface(API) network security Java programming language real time systems security of data third libraries hook system service call Linux Android application dynamic monitoring
  • 相关文献

参考文献3

二级参考文献71

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 2Gartner. Worldwide smartphone sales in Q3 2013 [EB/OL]. [ 2014- 01-08 ]. http://www, gartner, com/newsroom/id/ 2623415.
  • 3AppBrian Stats. Number of available Android applications [EB/OL]. [2014-01-08]. http://www, appbrain, com/stats/.
  • 4Consumer Reports. Keep your phone safe-How to protect yourself from wireless threat [EB/OL].[ 2014-01-08 ]. http ://www. eonsumerreports, org/ero/net0613, htm # info.
  • 5TrustGo. BSides Las Vegas: Your droid has no clothes [EB/OL]. [2014-01-08]. http://blog, trustlook, corn/.
  • 6National Vulnerability Database. Vulnerability summary for eVE 2012-0056 [EB/OL]. [2013-12-09]. http..//web, nvd. nist. gov[view]vulnldetail?vulnId=CVE-2012-OO56&cid= 2.
  • 7Nakamura Y, Sameshima Y. SELinux for electronics devices [C]//Proe of Linux Symp. Ottawa:Linux Symp Inc, 2008: 125-133.
  • 8Bugiel S, Davi L, Dmitrienko A, et al. Practical and lightweight domain isolation on android [C] //Proc of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011:51-62.
  • 9Smalley S, Craig R. Security enhanced (SE) Android: bringing flexible MAC to Android [C/OL] //Proc of the 20th Annual Network and Distributed System Security Syrup. 2013 [2014-03-20]. http://www, internetsociety, org/events/ ndss-symposium- 2013 / papers-and- pr esentations.
  • 10Kim S H, Han D, Lee D H. Predictability of Android OpenSSL's pseudo random number generator [C] //Proc of the 2013 ACM SIGSAC Conf on Computer Communications Security. New York: ACM, 2013:659-668.

共引文献94

同被引文献10

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部