期刊文献+

基于权限分析的Android隐私数据泄露动态检测方法 被引量:13

Dynamic Detection of Android Privacy Leakage based on Permission Analysis
在线阅读 下载PDF
导出
摘要 针对现有Android平台隐私数据泄露动态检测方法检测效率较低的情况,文章设计并实现了一种基于权限分析的Android隐私数据泄露动态检测方法。该方法将Android静态检测中的权限分析与动态污点检测结合,根据应用程序申请的权限确定动态污点检测的隐私数据类型和隐私出口类型。检测选项保存在系统属性中。实验结果显示,该方法能够在保证隐私数据泄露检测有效性的前提下,提高动态污点检测的效率。 Current dynamic detection method of private data on Android platform is inefifcient. To solve this problem, a novel dynamic detecting method based on permission analysis is designed and implemented. This method combines static permission analysis with dynamic taint detection. The taint types and privacy export types in dynamic detection are determined by the permissions application applies for. The detection options are set through Android system properties. The experimental results show that this method can improve the efficiency of dynamic taint detection without affecting effectiveness.
作者 高岳 胡爱群
出处 《信息网络安全》 2014年第2期27-31,共5页 Netinfo Security
基金 国家发改委信息安全专项
关键词 权限分析 隐私数据泄露 动态污点检测 Android Android permission analysis privacy leakage dynamic taint detection
  • 相关文献

参考文献13

  • 1Kantar Worldpanel ComTech. Smartphone[EB/OL].http://www. kantarworldpanel.com/dwl.php?sn=news_downloads&id=355, 2013.
  • 2360互联网安全中心.2013年上半年中国手机安全状况报告[EB/OL].http://msoftdl.360cn/mobilesafe/shouji360/report/2013report.-final.pdf,2013-08-09.
  • 3Jacob G, Debar H, Filiol E. Behavioral detection of malware: from a survey towards an established taxonomy[J]. Journal in computer Virology, 2008, 4(3): 251-266.
  • 4Chandramohan M, Tan H. Detection of mobile malware in the wild[J]. 2012.
  • 5杨广亮,龚晓锐,姚刚,韩心慧.一个面向Android的隐私泄露检测系统[J].计算机工程,2012,38(23):1-6. 被引量:25
  • 6Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection[C]//Computer Security Applications Conference, 2007. ACSAC 2007. Twenw-Third Annual. IEEE, 2007:421-430.
  • 7Enck W, Octeau D, McDaniel P, et al. A Study of Android Application Security[C]//USENIX security symposium. 2011.
  • 8Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid: behavior- based malware detection system for android[C]//Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2011: 15-26.
  • 9Blasing T, Batyuk L, Schmidt A D, et al. An android application sandbox system for suspicious software detection[C]//Malicious and Unwanted Software (MALWAP,.E), 2010 5th International Conference on. IEEE. 2010: 55-62.
  • 10Enck W, Gilbert P, Chun B G, et al. TaintDroid: An Information- Flow Tracking System for P.ealtime Privacy Monitoring on Smartphones[C]//OSDI. 2010, (10): 255-270.

二级参考文献11

  • 1Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 2Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 3Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 4Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 5Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 6Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 7Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 8Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 9Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.
  • 10Gilbert P,Chun B,Cox L P,et al.Vision:Automated SecurityValidation of Mobile Apps at App Markets[C]//Proc.of MCS’11.Washington D.C.,USA:[s.n.],2011.

共引文献24

同被引文献137

引证文献13

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部