期刊文献+

基于多因素聚类选择的Android应用程序分类风险评估方法 被引量:2

Classified risk assessment method of Android application based on multi-factor clustering selection
下载PDF
导出
摘要 大多数现有的Android应用程序风险评估根据经验直接指定因素的权重,通过统计少量因素的使用频率来计算安全风险。提出一种新的Android应用风险评估方法,能够同时提供定量和定性评估。该方法融合系统权限、API调用、Intent Filter的action属性以及数据流等多种风险因素,基于因素的风险分类与加成进行风险赋值,基于层次聚类对因素子集进行权重分配。实验表明,评估结果能够有效地反映Android应用程序的真实安全风险。 Most existing risk assessments of Android applications directly assign weights to factors according to experience,and calculate security risks by counting the frequency statistics of few factors.A new method for risk assessment of Android applications is proposed,which can provide both quantitative and qualitative assessment.This method integrates multiple risk factors such as system permissions,API calls,the action properties of Intent Filter,and data flow.The risks of factors are assigned based on their risk classification and addition,and the weights of factor subsets are distributed based on hierarchical clustering.Experiments show that the assessment results can effectively reflect the real security risks of Android applications.
作者 超凡 杨智 杜学绘 韩冰 CHAO Fan;YANG Zhi;DU Xuehui;HAN Bing(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《网络与信息安全学报》 2021年第2期161-173,共13页 Chinese Journal of Network and Information Security
基金 国家重点研发计划(2018YFB0803603) 国家自然科学基金(61802436)。
关键词 安卓 风险评估 安全威胁 静态分析 层次聚类 Android risk assessment security threat static analysis hierarchical clustering
  • 相关文献

参考文献4

二级参考文献39

  • 1SCAP中文社区. Android漏洞信息库[Z/OL]. (2013-12-20). http://android.scap.org.cn. 被引量:1
  • 2赛门铁克安全响应中心. 《互联网安全威胁报告》[Z/OL]. http://www.symantec.com/zh/cn/security_response/publications/threatreport.jsp. 被引量:1
  • 3Enck W, Gilbert P, Chun B G, et al. TaintDroid:An information flow tracking system for real-time privacy monitoring on smartphones[J].Communications of the ACM, 2014,57(3):99-106. 被引量:1
  • 4Reina A, Fattori A, Cavallaro L. A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors[C]//Proceedings of European Workshop on Systems Security. Prague, Czech Republic:EuroSec, 2013:135-141. 被引量:1
  • 5Wei X, Gomez L, Neamtiu I, et al. ProfileDroid:Multi-layer profiling of Android applications[C]//Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. Istanbul, Turkey:ACM, 2012:137-148. 被引量:1
  • 6Yan L K, Yin H. DroidScope:Seamlessly reconstructing the OS and dalvik semantic views for dynamic Android malware analysis[C]//Proceedings of the 21st USENIX Conference on Security Symposium. Washington DC, USA:USENIX Security Symposium, 2012:569-584. 被引量:1
  • 7Zhang Y, Yang M, Xu B, et al. Vetting undesirable behaviors in Android apps with permission use analysis[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. Hangzhou, China:ACM, 2013:611-622. 被引量:1
  • 8Chen K Z, Johnson N M, D'Silva V, et al. Contextual policy enforcement in Android applications with permission event graphs[C]//Proceedings of 20th Annual Network & Distributed System Security Symposium. San Diego, USA:NDSS, 2013. 被引量:1
  • 9Wu D J, Mao C H, Wei T E, et al. Droidmat:Android malware detection through manifest and API calls tracing[C]//Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference. Tokyo, Japan:IEEE, 2012:62-69. 被引量:1
  • 10Bl?sing T, Batyuk L, Schmidt A D, et al. An android application sandbox system for suspicious software detection[C]//Malicious and Unwanted Software (MALWARE), 20105th International Conference. Nancy, France:IEEE, 2010:55-62. 被引量:1

共引文献17

同被引文献7

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部