期刊文献+

基于静态分析的APK安全检测系统的设计与实现 被引量:2

Design and Implementation of APK Security Detection Based on Static Technology
在线阅读 下载PDF
导出
摘要 针对智能手机普及带来的第三方应用程序中大量隐私信息泄露及权限滥用问题,采用静态分析技术,逆向反编译解析APK文件,检测应用程序是否存在泄露用户隐私和滥用手机权限。提出采取安装应用程序之前展示可能涉及的权限和API的方法,为用户选择提供参考依据,从而解决隐私信息泄露和权限滥用问题。 In terms of a large number of privacy information leaks and permissions abuses in the third party applications which are brought by the popularity of smart phones, static analysis technology and the reverse decompile of APK files are utilized to dectect whether there are leaks of privacy information and the abuse of permissions in application programs. A solution is proposed to demonstrate permissions and API that possibly are involved before installing an application. It helps to provide references for the users to select, so that the problem of privacy information leaks and permissions abuses can be solved.
作者 曹勇 李军虎 陈晓升 CAO Yong;LI Junhu;CHEN Xiaosheng(Information Security Department,Naval University of Engineering,Wuhan 430033;No.92665 Troops ofPLA,Cili 427200;No.91650Troops of PLA,Zhanjiang 524000)
出处 《计算机与数字工程》 2018年第10期2146-2150,共5页 Computer & Digital Engineering
关键词 ANDROID 隐私泄露 静态检测 权限 Android privacy disclosure static detection privilege abuse
  • 相关文献

参考文献5

二级参考文献62

  • 1罗隆诚.手机病毒防治[J].计算机安全,2006(7):65-67. 被引量:6
  • 2江洁.手机病毒的发展及对策[J].信息通信,2007,20(3):70-72. 被引量:3
  • 3[2]Kaspersky Lab.Kaspersky Security Bulletin 2006:Mobile Malware[EB/OL].http://www.viruslist.com/en/analysis?pubid=204791922,Feb2007.
  • 4[3]Neal Leavitt.Mobile Phones:The Next Frontier for Hackers[J].IEEE Computer,April 2005,38(4):20~23.
  • 5[5]David Emm.Mobile malware-new avenues[J].Network Security,November 2006:4~6.
  • 6[6]Sampo Toyssy,Marko Helenius.About malicious software in smartphones[J].Comput Virol,2006,2:109~119.
  • 7Lab K.First SMS Trojan Detected for Smartphones running Android[EB/OL].(2010-03-05)[2010-11-15].http://www.kaspersky.com/news?id=207576156.
  • 8Wang Z,A Stavrou.Exploiting Smart-Phone USB Connectivity For FunAnd Profit[C] //Annual Computer Security Applications Conference,Austin,Texas USA,2010:357-366.
  • 9Davi L,et al.Privilege escalation attacks on Android[C] //Informa-tion Security Conference-ISC,2010:346-360.
  • 10Roman Schlegel,K Z,Xiaoyong Zhou,et al.Soundcomber:AStealthy and Context-Aware Sound Trojan for Smartphones[C/OL] //Proceedings of the Network and Distributed System Security Symposi-um,NDSS 2011,San Diego,California,USA,6th February–9thFebruary 2011[2011-05-15].http://www.isoc.org/isoc/confer-ences/ndss/11/pdf/1_1.pdf.

共引文献82

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部