期刊文献+

安卓应用的回调序列与模型检测应用

Callback sequence and model detection in Android application
下载PDF
导出
摘要 为分析安卓应用回调函数的时序调用关系,提出一种全局、细粒度的回调函数建模方法,涵盖对生命周期、非生命周期及不同类型组件间的回调函数处理,关注回调序列上的注册对象定义及操作。利用模型检测语言NuSMV表征生成的回调序列,LTL (linear temporal logic)表示目标验证属性,得以自动化地验证应用缺陷。通过设计一个移动应用回调排序原型系统SQDroid,并将该系统应用在数据竞争缺陷检测上,验证了该方法的有效性。 To provide a sequential call analysis between callback functions in Android application,aglobal and fine-grained model for callback functions was proposed.The callback functions among life cycle,non-life cycle and different types of components were addressed.The definitions and operations of registration object of callback sequence were also contained.The callback sequences were generated using the model detection language NuSMV,and the target verification attribute was represented by the LTL(linear temporal logic),so the defects could be verified automatically.A mobile application callback sequencing prototype system SQDroid was designed to detect data competition flaws.The validity of the method is demonstrated.
作者 崔洁 陈亮 康介恢 吴彦峰 于家伟 CUI Jie;CHEN Liang;KANG Jie-hui;WU Yan-feng;YU Jia-wei(Electric Power Research Institute,State Grid Tianjin Electric Power Company,Tianjin 300384,China;College of Computer and Control Engineering,Nankai University,Tianjin 300350,China)
出处 《计算机工程与设计》 北大核心 2019年第1期218-222,235,共6页 Computer Engineering and Design
基金 天津市自然科学基金重点基金项目(17JCZDJC30700)
关键词 ANDROID应用 回调函数 模型检测 缺陷检测 数据竞争 Android application callback function model checking defect detection data race
  • 相关文献

参考文献2

二级参考文献151

  • 1Motive Security Labs. Malware report--H2. 2014. http:/Pooletines.prisadigital.eom/MKT2015019837EN_2H2014. 被引量:1
  • 2Malware Report.pdf Mawston N. Strategy Analytics. Android shipped 1 billion smartphones worldwide in 2014. 2014. http://www.strategyanalyties.cora/ de fault.aspx?mod---reportabstraetviewer&a0= 10539. 被引量:1
  • 3Zhou Y, Jiang X. Dissecting android malware: Characterization and evolution. In: Prec. of the 2012 IEEE Syinp. on Security and Privacy (SP). 2012.95-109. [doi: 10.1109/SP.2012.16]. 被引量:1
  • 4Felt AP, Firtifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). 2011, 3-14. [doi: 10.1145/2046614.2046618]. 被引量:1
  • 5La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 2013,15(1): 446--471. [doi: 10.1109/SURV.2012.013012.00028]. 被引量:1
  • 6Enck W. Defending users against smartphone apps: Techniques and future directions. In: Proc. of the 7th Int'1 Conf. (ICISS 2011). LNCS 7093, Springer-Verlag, 2011.49-70. [doi: 10.1007/978-3-642-25560-1_3]. 被引量:1
  • 7Fledel Y, Shabtai A, Potashnik D, Elovici Y. Google Android: An updated security review. In: Proe. of the 2nd Int'1 ICST Conf. (MobiCASE 2010). Springer-Verlag, 2010. 401-414. [doi: 10.1007/978-3-642-29336-8_29]. 被引量:1
  • 8Shabtai A, Fledel Y, Kanonov U, Elovicil Y, Dolev S. Google Android: A state-of-the-art review of security mechanisms, arXiv:0912. 5101 [cs.CR], 2009. http://arxiv.org/ftp/arxiv/papers/0912/0912.5101 .pdf. 被引量:1
  • 9Burns J. Developing secure mobile applications for Android. 2008. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/ isec securing_android apps .pdf. 被引量:1
  • 10Enck W, Ongtang M, McDaniel P. Understanding Android security. IEEE Security & Privacy, 2009,7(1):50-57. [doi: 10.1109/MSP 2009.26]. 被引量:1

共引文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部