期刊文献+

Android应用权限检测技术研究 被引量:1

Research on Android Application Permission Monitor
下载PDF
导出
摘要 随着近年来移动互联网的快速兴起,智能手机,特别是基于Android系统的智能手机极速崛起.Android系统问题日益突出,Android系统虽然提供较完整的安全机制,但其"All-Or-None"的应用授权模式以及应用一旦安装,用户就无法更改其权限,这一权限管理模式存在安全隐患.为此,提出一种基于静态权限分析,并通过重打包注入代码的方法,实现对目标应用敏感权限的实时监控.实验证明,该方法能对权限的使用进行有效监控. With the rapid rise of mobile Internet in recent years, smart phones, especially based on Android system, also developed rapidly. The issues of Android system become increasingly prominent. Though Android system provides a relatively complete security mechanism, its “ All- Or-None” application authorization mode, as well as the permission management mode in which users cannot change their permissions after the application is installed, exists security risks. Therefore, this paper proposed a method based on the static permission analysis and code injection method, to achieve the target for real-time monitoring of sensitive permission. Experiments show that this method can effectively monitor the use of permissions.
作者 雷磊 胡勇
出处 《信息安全研究》 2017年第2期139-144,共6页 Journal of Information Security Research
关键词 安卓 恶意应用 静态分析 重打包 权限监控 Android malicious application static analysis repackage permission monitor
  • 相关文献

参考文献7

二级参考文献55

  • 1杨博,唐祝寿,朱浩谨,沈备军,林九川.基于静态数据流分析的Android应用权限检测方法[J].计算机科学,2012,39(S3):16-18. 被引量:8
  • 2Google Android Team.Android SDK 1.5 r2 Reference[EB/OL].(2009-06-30)[2010-1-17].http://developer.android.com. 被引量:1
  • 3高焕堂.OPhone应用开发雕龙小技[EB/OL].(2010-03-04)[2010-03-15].http://dev.chinamobile.com/cmdn/bbs/ viewthread.php?tid=10567. 被引量:1
  • 4Android. A New Android Market for Phones[EB/OL]. http://www. android.com,2010-11-03/2011-07-01. 被引量:1
  • 5Enck W, OngTang M, and McDaniel P. Understanding Android Security[J]. IEEE Security and Privacy, 2009,7(01):50-57. 被引量:1
  • 6Burns J. Developing Secure Mobile Applications for Android[R]. Technical Report, iSEC,2008. 被引量:1
  • 7张中文,雷灵光,王跃武.AndroidPermission机制的实现与安全分析[c]//第27次全国计算机安全学术交流会论文集.出版地不详:出版者不祥,2012:3-6. 被引量:2
  • 8W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information - flow tracking nsystem for realtime privacy monitoring on smartphones[ C ]. In Proc. 9th USENIX Symposium on Operating Systems Design and Implementation, 2010. To appear. 被引量:1
  • 9T. Vennon and D. Stroop. Threat analysis of the android market[ EB/OL]. 2010. http ://www. globahhreatcenter. com/wp - content/uploads/2010/06/ Android - Market - Threat - Analysis - 6 - 22 - 10 - vl. pdf. 被引量:1
  • 10Wook Shin, Shlnsaku Ydyomoto, Kazuhide Fukushima, Toshlaki Tanaka. A formal model to analyze the permis- sion authorization and enforcement in the Android frame- work[C]. In Proceedings of the 2010 IEEE Second In- ternational Conference on Social Computing, SOCIAL- COM 10, 2010. 944-951. 被引量:1

共引文献70

同被引文献3

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部