期刊文献+

Android系统木马隐藏及检测技术 被引量:12

Trojan Horse’s Hiding and Detecting Technique of Android OS
在线阅读 下载PDF
导出
摘要 Android操作系统用户数量庞大,已经成为黑客攻击的重要目标。作为攻击Android操作系统的主要手段,特洛伊木马拥有良好的隐蔽性、欺骗性和破坏性。因此针对Android的木马隐藏及检测技术的研究也越来越有必要。文章首先从Linux内核和Android系统架构两个方面分析了Android操作系统的安全机制,针对Android平台下木马的隐藏技术和检测方法进行了详细论述,并提出了一种基于系统调用拦截的检测方法。 Android operating system has a large number of users, it has already become an important objective of hacker’s attacking. As a major measure of attacking Android, Trojan horse has well elusive, fraudulence and destructiveness. So it is more and more important to research on Trojan’s hiding and detecting technique in Android. This article, firstly analyzed the security mechanism of Android from two aspects of the Linux kernel and the Android framework. Secondly, it discussed the hiding technique and detecting method of Trojans which aimed at Android platform. Finally, put forward a detecting method based on intercepting system call.
出处 《信息网络安全》 2013年第1期33-37,共5页 Netinfo Security
关键词 ANDROID 隐藏技术 木马检测 系统调用 android hiding technique detecting trojans system call
  • 相关文献

参考文献13

  • 1Katysovas T. A first look at Google Android[M].Free University ofBolzano,2008.12-26.
  • 2网秦安全公司.2012上半年全球手机安全报告[R]北京,2012.
  • 3张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 4Enck,William,Ongtang,Machigar McDaniel Patrick. Understanding Android Security[J].IEEE security &privacy,2009,(01):50-57.
  • 5Burns J. Developing Secure Mobile Applications for Android[R].Isec,2008.
  • 6Shin,Wook1,Kiyomoto,Shinsaku1 Fukushima Kazuhide1 Tanaka Toshiaki. A formal model to analyze the permission authorization and enforcement in the Android framework[M].IEEE Computer Society,2010.
  • 7C.Mulliner,G.Vigna,D.Dagon,W.Lee. Using labeling to prevent cross-service attacks against srnartphones[A].
  • 8袁源,戴冠中.LKM后门综述[J].计算机科学,2008,35(7):5-8. 被引量:12
  • 9D.P.Bovet;陈莉君.深入理解Linux内核(第三版)[M]北京:中国电力出版社,2007.
  • 10Butler J,Jeffrey L,John Pinkson. Hidden Processes:The Implication for Intrusion Detection[A].West Point,NY,2003.

二级参考文献36

共引文献58

同被引文献77

引证文献12

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部