期刊文献+

Android平台恶意软件行为模式研究

A Study on Malware Behavior Patterns in the Android Platform
下载PDF
导出
摘要 黑客利用恶意软件攻击Android平台,这给Android平台带来巨大的安全威胁,并给用户的切身利益带来严重的损害。研究针对Android平台恶意软件的行为模式包括重新包装、嵌入式隐藏、控制权限等,获取用户的账号、密码等。这种行为一般具有一套方式,掌握其特点,以相应手段预防。 Hackers use malware to attack the Android platform, which brings the huge security threat to the Android platform and causes serious damage to the immediate interests of users. This paper makes a study on the behavior patterns of malware on the Android platform, including repackaging, embedded hiding, control permissions, obtaining the user’s account number and password, and so on. This kind of behavior generally has a set of patterns. In this sense, there is a need to master its characteristics and to prevent it by appropriate means.
作者 叶宇光 Ye Yuguang(Quanzhou Normal University, Quanzhou 362000, China)
机构地区 泉州师范学院
出处 《黑河学院学报》 2018年第12期206-207,共2页 Journal of Heihe University
基金 福建省中青年教师教育科研项目(科技A类)"基于多特征融合的Android恶意软件检测研究"(JA15397)
关键词 ANDROID平台 恶意软件 软件行为模式 Android platform malware software behavior patterns
  • 相关文献

参考文献3

二级参考文献97

  • 1吴俊昌,骆培杰,程绍银,等.基于权限分类的Android应用程序的静态分析[c]//第四届信息安全漏洞分析与风险评估大会.北京,2011:61-71. 被引量:2
  • 2国家计算机网络应急技术处理协调中心.2012年中国互联网网络安全报告[R].北京:中国邮电出版社,2013:16-17. 被引量:3
  • 3Miettinen M, Halonen P. Host- based intrusion detec- tion for advanced mobile devices [ J ]. Information Net- working and Applications, 2006,20(4) : 72 - 76. 被引量:1
  • 4Enck W, Gilbert P, Chun B, et al. TaintDroid: An Information -flow Tracking System for Reahime Privacy Monitoring on Smartphones [ C ]//Proc. of OSDI' 10. Vancouver, Canada,2010. 被引量:1
  • 5Schmidt A D. Smartphone malware evolution revisited: Android next target? [ C]. In Proceedings of the 4th In- ternational Conference on Malicious and Unwanted Soft- ware (malware). Montreal, QC, 2009 : 1 - 7. 被引量:1
  • 6Schmidt A D. Detection of Smartphone Maiware [ D ]. Universitatsbibliothek, 2011. 被引量:1
  • 7Bose A, Hu X, Shin K G, et al. Behavioral detection of malware on mobile handsets [ C ]. Proceedings of the 6th international conference on Mobile systems, applications and services. ACM, 2008 : 225 - 238. 被引量:1
  • 8Sharma K, Dand T, Oh T, et al. Malware analysis for Android operating [ C ]. The 8th Annual Symposium on Information Assurance (ASIA'13). 2013:31. 被引量:1
  • 9Christodorescu M, Jha S. Static analysis of executables to de- tect malicious patterns [ C ]//Proceedings of the 12th confer- ence on USENIX security. Berkeley, CA, USA : [ s. n. ] ,2003. 被引量:1
  • 10Rieck K, Holz T, Willems C, et al. Learning and classification of malware behavior[ C ]//Proc of detection of intrusions and malware, and vulnerability assessment. [ s. I. ] : [ s. n. ], 2008 : 108-125. 被引量:1

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部