期刊文献+

Android系统文件监听技术的研究 被引量:8

Research of the File Monitoring Technology in Android
在线阅读 下载PDF
导出
摘要 文章对Android操作系统上的基于FileObserver技术的监听机制进行了分析,针对其监听结果不能获取访问对象的问题,提出了基于脚本命令的联合监听技术,并对提出的联合监听方式的关键技术与实现细节进行了详细阐述。实验测试在Android操作系统4.0的华为U8825D手机上进行,测试结果表明,基于脚本命令的联合监听技术可以获取访问文件对象的信息。最后,对该项技术进行了性能分析,并针对它的一些性能问题提出了改进方案。 In this paper, the Android operating system monitoring mechanism based on the technology of FileObserver is analyzed. In allusion to the problem of the surveillance results without information of the application that access the monitored file, the joint monitoring technology based on script command is put forward. The key technology and implementation methods on joint monitoring technology are elaborated in detail. This technology is tested on U8825D huawei mobile phone with Android OS 4.0. The result of the study shows that the joint monitoring technology based on script commands can get access to the information about the access applications. Finally, We analyze the performance of monitoring technology of the joint script command and put forward an improved scheme for some performance problems.
出处 《信息网络安全》 2014年第3期46-51,共6页 Netinfo Security
基金 国家发改委信息安全专项
关键词 文件监听 监听机制 联合脚本命令 LINUX 内核 Android Android file monitoring monitoring mechanism joint script command Linux kernel
  • 相关文献

参考文献20

  • 1R. Xu, H. Saidi, R. Anderson. Aurasium: practical policy enforcement for Android applications[C]. Securiw'12 Proceedings of the 21st USENIX conference on SecuriW symposium. Berkeley, CA, USA: 2012.
  • 2王玮.基于Android系统的恶意程序原理分析[J].信息网络安全,2012(10):71-76. 被引量:10
  • 3W. Enck, M. Ongtang, P. AcDaniel. Understanding Android Security[J]. IEEE Security and Privacy, 2009, 7(1): 50-57.
  • 4蒋绍林,王金双,张涛,陈融.Android安全研究综述[J].计算机应用与软件,2012,29(10):205-210. 被引量:58
  • 5R. Fedler, M. Kulicke, J. Schutte. An antivirus API for Android malware recognition[C]. 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE): 2013, 22-24.
  • 6L. Jeter, S. Mishra. Identifying and quantifying the android device users' security risk exposure[C]. 2013 International Conference on Computing, Networking and Communications (ICNC). San Diego, CA: 2013, 11-17.
  • 7S. Matsumoto, K. Sakurai. A proposal for the privacy leakage verification tool for Android application developers[C]. ICUIMC '13 Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: 2013.
  • 8杨珉,王晓阳,张涛,张建军.国内Android应用商城中程序隐私泄露分析[J].清华大学学报(自然科学版),2012,52(10):1420-1426. 被引量:19
  • 9王志国,侯银涛,石荣刚.Android智能手机系统的文件实时监控技术[J].计算机安全,2009(12):42-44. 被引量:19
  • 10Zhihong Tian, Bailing Wang, Zixi Zhou, Hongli Zhang. The research on rootkit for information system classified protection[C]. 2011 International Conference on Computer Science and Service System (CSSS). Nanjing, JiangSu, CN: 201 1,890-893.

二级参考文献68

  • 1张和君,张跃.Linux动态链接机制研究及应用[J].计算机工程,2006,32(22):64-66. 被引量:10
  • 2李善平 陈文智.边学边干-Linux内核指导[M].杭州:浙江大学出版社,2002..
  • 3毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 4William Stallings.操作系统-精髓与设计原理[M].北京:清华大学出版社,2002.
  • 5Lab K.First SMS Trojan Detected for Smartphones running Android[EB/OL].(2010-03-05)[2010-11-15].http://www.kaspersky.com/news?id=207576156.
  • 6Wang Z,A Stavrou.Exploiting Smart-Phone USB Connectivity For FunAnd Profit[C] //Annual Computer Security Applications Conference,Austin,Texas USA,2010:357-366.
  • 7Davi L,et al.Privilege escalation attacks on Android[C] //Informa-tion Security Conference-ISC,2010:346-360.
  • 8Roman Schlegel,K Z,Xiaoyong Zhou,et al.Soundcomber:AStealthy and Context-Aware Sound Trojan for Smartphones[C/OL] //Proceedings of the Network and Distributed System Security Symposi-um,NDSS 2011,San Diego,California,USA,6th February–9thFebruary 2011[2011-05-15].http://www.isoc.org/isoc/confer-ences/ndss/11/pdf/1_1.pdf.
  • 9Enck W,Kevin B,et al.Defending Users Against Smartphone Apps:Techniques and Future Directions[C] //Information Systems Security–7th International Conference,ICISS 2011,Kolkata,December 15-19,2011:49-70.
  • 10Gartner:Gartner Says Sales of Mobile Devices in First Quarter of 2011Grew 16.5 Percent Year-on-Year;Smartphone Sales Grew 74 Percent[EB/OL].(2011-08-10)[2011-09-25].http://www.gart-ner.com/it/page.jsp?id=1764714.

共引文献188

同被引文献144

  • 1王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 2李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:20
  • 3王晓甜,张玉清.安全漏洞自动收集系统的设计与实现[J].计算机工程,2006,32(20):177-179. 被引量:10
  • 4马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 5吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 6Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 7Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 8Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 9Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 10Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部