期刊文献+

DroidDefence:细粒度的Android应用权限管理系统 被引量:4

Droid Defence:An Extended Fine-grained Android Application Permission Management System
在线阅读 下载PDF
导出
摘要 现有的Android权限管理机制存在管理粒度过粗,不能动态配置,且不支持用户自定义管理应用程序权限诸多缺陷。提出一个细粒度的Android应用权限管理系统Droid Defence。该系统通过对现有Android应用权限机制的扩展,结合轻量级客户端程序,实现对应用程序细粒度的权限审核管理,用户可以由不同的应用场景动态分配应用程序权限,同时系统采用众包技术收集处理用户应用权限信息,并给予安全反馈。实验表明,该系统移动端和云端技术相结合,以较小能耗,保护用户隐私,提升系统的安全性。 The existing Android system does not allow customized application permission due to its coarse-grained and inflexible management mechanism.To solve this problem,Droid Defence,a fine-grained Android permission management system was proposed,which was extended on the base of the original Android framework.Users can dynamically allocate application permissions under different scenarios through a light-weight client deployed on mobile device.And safety reports would be released after user data collection and processing based on mobile cloud crowdsourcing.Experimental results showed that Droid Defence can enhance system security and protect user privacy with little system consumption.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2014年第6期14-18,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(61373006) 南京邮电大学科技基金资助项目(NY212059)
关键词 Android安全 安全机制 权限控制 隐私保护 众包 恶意软件 Android security security mechanism permission control privacy protection crowdsourcing malware
  • 相关文献

参考文献4

二级参考文献54

  • 1陈汉章,张玉清.访问控制框架及其在Linux中的应用研究[J].计算机应用研究,2007,24(4):217-219. 被引量:5
  • 2Google Android Team.Android SDK 1.5 r2 Reference[EB/OL].(2009-06-30)[2010-1-17].http://developer.android.com.
  • 3高焕堂.OPhone应用开发雕龙小技[EB/OL].(2010-03-04)[2010-03-15].http://dev.chinamobile.com/cmdn/bbs/ viewthread.php?tid=10567.
  • 4Gartner november report [ EB/OL]. [ 2011-11-15 ] http://www. gartner. com/it/page, jsp. id = 1848514.
  • 5ENCK W,OCTEAU D,MCDANIEL P,et al. A study of android application security [ C ] //Proc of the 20th USENIX Security Symposium. Berkeley : USENIX Association, 2011.
  • 6SCHLEGEL R, ZHANG K, ZHOU X,et al. Soundcomber: a stealthy and context-aware sound trojan for smartphones [ C]//Proc of the 18th Annual Network and Distributed System Security Symposium. 2011 : 17-33.
  • 7ENCK W, ONGTANG M,MCDANIEL P. On lightweight mobile phone application certification [ C ]// Proc of the 16th ACM Conference on Computer and Communications Security. New York : ACM, 2009:235-245.
  • 8FELT A P,CHIN E, HANNA S,et al. Android permissions demystified [C]//Proc of the 18th ACM Conference on Computer and Communications Security. New York : ACM ,2011.
  • 9ENCK W, GILBERT P, B G, et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones [ C]// Proc of the 9th USENIX Symposium on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2010.
  • 10ZHOU Ya-jin, ZHANG Xin-wen, JIANG Xu-xian, et al. Taming information-stealing smartphone applications (on Android) [ C]//Proc of the 4th International Conference on Trust and Trustworthy Computing. 2011:93-107.

共引文献105

同被引文献37

  • 1Lookout,Inc.Lookout Mobile Security Report 2011 [EB/ OL].[2014-11-15].(2011-10-12).https://www.mylookout.com/ mobile-threat-report.
  • 2Juniper Networks,Inc.2011 Mobile Threats Report [EB/ OL].[2014-11-16].(2012-03-01).http://www.juniper.net/ us/en/ local/ pdf/ additionalresources/ jnpr-2011-mobile-threats-report.pdf.
  • 3CAREY NACHENBERG.A Window into Mobile Device Security [EB/ OL].[2014-11-10].(2012-03-01).http://www.symantec.com/ content/ en/ us/ about/ media/ pdfs/ symc_mobile_device_security_june2011.pdf? om_ext_cid = biz_socmed_twitter_facebook_marketwire_linkedin_2011Jun_worldwide_mobilesecuritywp.
  • 4PRABIR BHATTACHARYA,LI Yang,GUO Minzhe,et al.Learning Mobile Security with Labware [J].IEEE Security &Privacy,2014,12(1):69-72.
  • 5PATRICK TAGUE.Mobile Security-Fall 2010 [EB/ OL].[2014-11-10].(2012-02).http://wnss.sv.cmu.edu/ courses/14829-f10.
  • 6PATRICK TAGUE.Mobile Security-Fall 2011 [EB/ OL].[2014-11-10].(2012-02).http://wnss.sv.cmu.edu/ courses/14829-f11.
  • 7JEREMY ANDRUS,JASON NIEH.Teaching Operating Systems Using Android [C]//Proceedings of the 43rd ACM TechnicalSymposium on Computer Science Education.New York:ACM,2012:613-618.
  • 8Strategy Analytics.Strategy Analytics:Android Captures Record 85 Percent Share of Global Smartphone Shipments in Q2 2014[EB/ OL].[2014-11-10].(2014-11-02).http://www.prnewswire.com/ news-releases/ strategy-analytics-android-captures-record-85-percent-share-of-global-smartphone-shipments-in-q2-2014-269301171.html.
  • 9RONAN SCHWARZ,PHIL DUTSON,JAMES STEELE,et al.The Android Developer's Cookbook:Building Applications withthe Android SDK [M].[S.l.] :Addison-Wesley Educational Publishers Inc,2013.
  • 10范明虎,樊红,伍孝金.ASP.net中基于RBAC的通用权限管理系统[J].计算机工程,2010,36(1):143-145. 被引量:32

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部