期刊文献+

基于Android权限信息的恶意软件检测 被引量:18

Malware detection based on Android permission information
下载PDF
导出
摘要 Android恶意软件对手机安全造成的威胁日益严重,为了防止恶意软件对手机造成的安全威胁,提出了一种从应用程序提取权限信息的方法,以此来检测软件的恶意行为。首先,在信息提取实验中,提取应用程序自身的权限信息和应用程序间具有权限提升威胁的信息,并对该信息进行统计分析,分别获得恶意软件和良性软件的差异和规律;其次,在检测实验中,根据提取实验的结果,利用机器学习和数据挖掘技术对应用软件进行分类,实现对恶意软件的静态检测。该方法能有效地对恶意软件进行预判断,达到检测的目的。实验结果表明,所提出的权限信息提取方法能较大地提高检测恶意软件的准确率。 The Android malware is becoming more and more serious security threat to mobile phone, so this paper proposed a method in order to prevent security threats from malware. First, it extracted the permission features in extraction experiment, which included the permission declare in each application and permission escalation between applications, analysed the difference between malware and benign with the extracted results. Then it used machine learning and data mining technology to detect the malware statically. The proposed method can effectively pre-judgment of the malware, and achieve the purpose of the detection. A conclusion can be drawn that the proposed method can greatly improve the accuracy of malicious detection.
出处 《计算机应用研究》 CSCD 北大核心 2015年第10期3036-3040,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61461010) 桂林电子科技大学研究生教育创新计划资助项目(GDYCSZ201413)
关键词 权限 恶意检测 安卓 机器学习 数据挖掘 permission malware detection Android machine learning data mining
  • 相关文献

参考文献18

  • 1Chebyshev V, Unuchek R. Mobile malware evolution: 2013 [ EB/OL]. (2014-02-24) . http://www. securelist. co- m/en/analysis/204792326/Mobile_Malware_Evolution_2013. 被引量:1
  • 2Enck W, Ongtang M, Mcda-Niel P. On lightweight mobile phone ap-plication certification [ C ] //Proc of the 16th ACM Conference onComputer and Communications Security. New York: ACM Press,2009:235-245. 被引量:1
  • 3Nauman M, Khan S, Zhang Xinwen. Apex: extending Android per-mission model and enforcement with user-defined runtime constraints[C ] //Proc of the 5th ACM Symposium on Information, Computerand Communications Security. 2010:328-332. 被引量:1
  • 4Glodek W, Harang R. Rapid permissions-based detection and analy-sis of mobile malware using random decision forests [ C ]//Proc ofIEEE Military Communications Conference. [ S. 1. ] : IEEE Press,2013:980-985. 被引量:1
  • 5Aswini A M, Vinod P. Droid permission miner: mining prominentpermissions for Android malware analysis [ C ] //Proc of the 5 th Inter-national Conference on the Applications of Digital Information andWeb Technologies. 2014:81-86. 被引量:1
  • 6Moonsamy V, Rong Jia, Liu Shaowu. Mining permission patterns forcontrasting clean and malicious Android applications [ J ]. FutureGeneration Computer Systems ,2014,36 : 122-132. 被引量:1
  • 7沈才樑,唐科萍,俞立峰,樊甫伟.Android权限提升漏洞攻击的检测[J].电信科学,2012,28(5):115-119. 被引量:18
  • 8Wu Dongjie, Mao C H, Wei T E, ef al. DroidMat: Android malwaredetection through manifest and API calls tracing [ C ] //Proc of the 7 thAsia Joint Conference on Information Security. 2012 : 62-69. 被引量:1
  • 9Su Mingyang, Chang Wenchuan. Permission-based malware detectionmechanisms for smart phones [ C ]//Proc of International Conferenceon Information Networking. 2014 :449-452. 被引量:1
  • 10Felt A P, Chin E, Hanna S, et al. Android permissions demystified[C]//Proc of the 18th ACM Conference on Computer and Communi-cations Security. 2011:627-638. 被引量:1

二级参考文献30

  • 1杨博,唐祝寿,朱浩谨,沈备军,林九川.基于静态数据流分析的Android应用权限检测方法[J].计算机科学,2012,39(S3):16-18. 被引量:8
  • 2Google.Android official website[EB/OL].[2009-11-10].http://www.android.com. 被引量:1
  • 3T-Mobile.The T-Mobile G1 with Google phone official site[EB/OL].[2009-11-10].http://www.t-mobileg1.com/. 被引量:1
  • 4Google.Android software developing kits 2.0[EB/OL].[2009-11-10].http://developer.android.com/sdk/. 被引量:1
  • 5Trusted Computing Group.TCG architecture overview[EB/OL].[2009-11-10].https://www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview.pdf. 被引量:1
  • 6STONES R,MATTHEW N.Beginning Linux programming[M].2nd ed.Birmingham:Wrox Press Ltd,2003. 被引量:1
  • 7BOVET D P,CESATI M.Understanding the Linux kernel[M].3rd ed.Sebastopol,CA:O'Reilly Media,Inc,2005. 被引量:1
  • 8Linux Kernel Organization Inc.Git[EB/OL].[2009-11-10].http://android.git.kernel.org/. 被引量:1
  • 9Shabtai A, Fledek Y, Kanonov U, et al. Google android:a comprehensive security assessment. IEEE Security & Privacy, 2010. 被引量:1
  • 10符易阳周丹平.Android安全机制分析.第26次全国计算机安全学术交流会论文集.2011. 被引量:1

共引文献79

同被引文献79

引证文献18

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部