期刊文献+

基于权限的Android应用程序安全审计方法 被引量:1

Permission-based Android application security evaluation method
在线阅读 下载PDF
导出
摘要 为了对安卓(Android)恶意应用程序进行检测,对其危险程度进行量化,并满足大批量样本的安全审计需求,提出一种基于权限的Android应用安全审计方法.使用数据挖掘方法分析权限信息,依据支持度和分离度构建评价指标集;基于改进的优序图法确定评价指标权重,建立权重矩阵;依据权重矩阵对安卓应用程序进行评估,通过逻辑回归方法检出恶意应用,并给出量化的评估值.使用抓取自网络的真实样本进行实验,结果表明可以有效检测恶意应用,评估值也能直观地反映应用的危险程度,对恶意应用和正常应用分类的准确度达到92.7%,与现有相关工作相比效率表现更优. A permission-based application security evaluation method was proposed to detect Android malware and quantify applications security risk for large scale samples.A data mining algorithm was designed to discover permission itemsets as evaluation indices according to their support and divisive value.An improved precedence chart was used to determine the indices weights,which were embedded into an evaluation matrix.Android applications were evaluated based on the evaluation matrix;malwares were detected by logistic regression;security risks were evaluated by a certain value.Experiments with real sample applications show that this method performs high accuracy on malware detection up to 92.7% and lower time cost than current methods.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2017年第3期590-597,共8页 Journal of Zhejiang University:Engineering Science
基金 国家科技支撑计划资助项目(2012BAH47B01) 国家自然科学基金资助项目(61271252)
关键词 安卓 权限 恶意程序 静态分析 移动安全 Android permission malware static analysis mobile security
  • 相关文献

参考文献3

二级参考文献15

  • 1JESSE B. Developing secure mobile application for Android[EB/OL] https://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf, 2008.
  • 2SCHMIDT A D, SCHMIDT H G, BATYUK L. Smartphone malware evolution revisited: Android next target[A]. Proceedings of the 4th IEEE/nternational Conference on Malicious and Unwanted Software [C]. USA, 2009. 1-7.
  • 3SCHMIDT A D, SCHMIDT H G, CLAUSEN J. Static analysis of executables for collaborative malware detection on android[A]. IEEE International Congress on Communication (ICC) 2009 - Communica- tion and Information Systems Security Symposium[C]. 2009.
  • 4ENCK W, ONGTANG M, MCDANIEL P. Understanding Android security[J]. IEEE Security and Privacy, 2009, 7(1):50-57.
  • 5SHABTAI A, FLEDEL Y, ELOVICI Y. Securing android-powered mobile devices using selinux[A]. IEEE Security and Privacy[C]. 2009.10-15.
  • 6BERGERON J, DEBBABI M, DESHARNAIS J. Static detection of malicious code in executable programs[A]. Proceedings of the Sym- posium on Requirements Engineering for Information Security[C]. USA, 2001.20-24.
  • 7MOSER A, KRUEGEL C, KIRDA E. Limits of static analysis for malware detection[A]. Proceedings of the 23rd Annual Computer Se- curity Application Conference[C]. Seoul, Korea, 2007.421-430.
  • 8BISHOP M A. The Art and Science of Computer Security[M]. Boston: Addison-Wesley Longman Publishing Co, 2002.213 -217.
  • 9http://www.symantec.com/securityresponse/writeup.j spdoeid=2011- 022303-3344-99[EB/OL].2001.
  • 10蔡罗成.Android后台监听实现机制浅析[J].信息安全与通信保密,2010,7(6):39-41. 被引量:31

共引文献118

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部