期刊文献+

一种针对Android平台恶意代码的检测方法及系统实现 被引量:21

A Detection Method and System Implementation for Android Malware
在线阅读 下载PDF
导出
摘要 针对Android恶意代码泛滥的问题,综合静态和动态分析技术,设计实现了Android恶意代码检测系统。在静态分析部分,提取Android程序中的权限、API调用序列、组件、资源以及APK结构构建特征向量,应用相似性度量算法,检测已知恶意代码家族的恶意代码样本;在动态分析部分,通过修改Android源码、重新编译成内核镜像,使用该镜像文件加载模拟器,实时监控Android程序的文件读写、网络连接、短信发送以及电话拨打等行为,基于行为的统计分析检测未知恶意代码。经过实际部署测试,所提检测方法具有较高的检测率和较低的误报率。所开发Android恶意代码检测系统已经在互联网上发布,可免费提供分析检测服务。 An Android malware detection system is designed and implemented to focus on the problem that malware on Android becomes widespread.The system combines static and dynamic analysis technologies.The APK features such as permission,API call sequences,component,resource and structure are extracted to form a feature vector in static analysis,and a similaritybased method is proposed to detect known malware samples using these features.Android source code is then updated to generate new kernel images in dynamic analysis.The new kernel images can monitor the Android program's behaviors such as file reading and writing,network connection,SMS sending and telephone calling,etc.Thus,unknown malware samples can be successfully identified through analyzing these behaviors.Experimental results show that the proposed system is efficient and performs well on detecting Android malware.The proposed system has been released online and free use of the system is available on the Internet.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2013年第10期37-43,共7页 Journal of Xi'an Jiaotong University
基金 国家自然科学(61103241 61103240 91118005) 2012年华为创新基金资助项目(YB2012120173)
关键词 ANDROID 恶意代码检测 静态分析 动态分析 Android malware detection static analysis dynamic analysis
  • 相关文献

参考文献8

  • 1ZHOU W,ZHOU Y,JIANG X,et al.Detecting repackaged smartphone applications in third-party Android marketplaces[C]// Proceedings of the Second ACM Conference on Data and Application Security and Privacy.New York,USA:ACM,2012:317-326.
  • 2BORJA S,IGOR S,CARLOS L,et al.PUMA:permission usage to detect malware in Android[C]// International Joint Conference CISIS' 12-ICEUTE' 12-SOCO' 12 Special Sessions.Berlin,Germany:Springer,2012:289-298.
  • 3BURGUERA I,ZURUTUZA U,NADJM-TEHRANI S.Crowdroid:behavior-based malware detection system for Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York,USA:ACM,2011:15-26.
  • 4ENCK W,GILBERT P,CHUN B G,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]// Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation.Berkeley,CA,USA:USENIX,2010:1-6.
  • 5ENCK W,ONGTANG M,MCDANIEL P.Understanding Android security[J].IEEE Security & Privacy,2009,7(1):50-57.
  • 6POCATILU P.Android applications security[J].Informatica Economicǎ,2011,15(3):163-171.
  • 7JIANG X.Security alert:new Android malwareHippoSMS-found in alternative Androidmarkets[EB/OL].[2012-10-07].http://www.csc.ncsu.edu/faculty/jiang/HippoSMS/.
  • 8CILIBRASI R,VITANYI P M B.Clustering by compression[J].IEEE Transactions on Information Theory,2005,51(4):1523-1545.

同被引文献160

引证文献21

二级引证文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部