期刊文献+

基于VFS的Android Rootkit技术研究 被引量:2

Study on Android Rootkit based on VFS
原文传递
导出
摘要 内核级Rootkit作为一种高效的攻击手段,在Windows以及Linux平台上被广泛采用。以Linux 2.6内核为基础的Android系列操作系统将面临内核级Rootkit攻击的风险。根据对Android电话系统的体系结构进行分析,以内核可加载模块(LKM)技术为基础,通过替换Android内核中虚拟文件系统(VFS)的相关系统调用,提出了一种Android平台上内核级Rootkit攻击方式。 As an efficient means of attack, Rootkit is widely used in Windows and Linux platforms. The Android system based on Linux 2.6 kernel faces risks various of this attack. Based on analysis of the Android telephone system architecture, a Rootkit attack working on Android OS is proposed, which is based on LKM(loadable kernel module) and replacement of the system call in VFS(virtual file system).
出处 《信息安全与通信保密》 2013年第1期68-69,74,共3页 Information Security and Communications Privacy
关键词 安卓系统 虚拟文件系统 ROOTKIT 可加载内核模块 Android VFS Rootkit LKM
  • 相关文献

参考文献7

二级参考文献22

  • 1刘晓星,胡畅霞,刘明生.安全加密算法DES的分析与改进[J].微计算机信息,2006,22(04X):32-33. 被引量:40
  • 2易宇,金然.基于符号执行的内核级Rootkit静态检测[J].计算机工程与设计,2006,27(16):3064-3068. 被引量:11
  • 3邱发林,李伟,周绍景.Unicode及中文到Unicode转换[J].科技信息,2006(03S):21-21. 被引量:13
  • 4徐彦琦,刘雅婧,黄登山.基于GSM短消息的编解码及编码实现[J].信息安全与通信保密,2007,29(5):56-58. 被引量:8
  • 5[1]Butler J,Sparks S.Windows rootkits of 2005,part one & part three[DB/OL].http://www.securityfocus.com/infocus,2006-01-05.
  • 6[2]Skoudis E,Counter Hack.Upper Saddle River.NJ:Prentice Hall PTR,2002:434.
  • 7[3]Silberschatz A,Galvin P,Gagne G.Applied Operating System Concepts.NY:John Wiley & Sons,2003:626.
  • 8[4]Samhain Labs.The Basics-Subverting the Kernel[DB/OL].http://la-samha.de/library/rootkits /basics.html,July 2003.
  • 9[5]Levine J,Grizzard J,Owen H.A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table.Proceedings of the Second IEEE International Information Assurance Workshop (IWIA' 04),2004:3-9.
  • 10[6]Samhain Labs.Detecting Kernel Rootkits[DB/OL].http://lasamha.de/library/rootkits/detect.html,July 2003.

共引文献14

同被引文献19

  • 1Strategy Analytics.2012年Q3全球智能手机数量突破10亿耗时16年[EB/OL].(2012-10-18).[2012-10-18].http://www.199it.com/archives/73840.html.
  • 2ENCK W, GILBERT P, CHUN B G, et al. TaintDroid: an Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones[M].USA:ACM, 2010:1-6.
  • 3ENCK W, OCTEAU D, MCDANIEL P, et al. A Study of Android Application Security[M].USA:ACM, 2011:21-21.
  • 4Gilbert P, Chun BG, Cox L P, et al. Vision: Automated Security Validation of Mobile ADDs at App Markets[M].USA:ACM, 2011.
  • 5Google. Permissions[EB/OL].(2012-04-23)[2012-09-18]. http://developer, android, com/guide/topics/securi ty/permissions, html.
  • 6Google. BroadcastReceiver[EB/OL]. (2012-04-23). [2012-09-18].http://developer. android, com/reference /android/content/BroadcastReceiver. html.
  • 7Google. Servers[EB/OL]. (2012-04-23)[2012-09-18]. http://developer, android, com/guide/components/services, html.
  • 8COUSOT P. Abstract InterDretation [EB/0L]. (2010-03-26)[2012-06-15].http://www. di. ens. fr/-cousot/AI/.
  • 9Google. Android SDK[EB/OL].(2012-04-23)[2012-09-18] http://developer, android, com/sdk/index, html.
  • 10ZHOU Y, JIANG X. Dissecting Android Malware Characterization and Evolution[C].USA:IEEE, 2012 95-109.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部