期刊文献+

基于签名查验的移动终端应用软件合法性判别技术 被引量:3

Signature Verification Based Legality Discrimination Technology for Mobile Terminal APPs
在线阅读 下载PDF
导出
摘要 随着移动终端设备的不断普及,越来越多的用户选择安装第三方应用软件以满足自己不同的需求。由于缺乏对应用软件合法性的辨别能力,大多数用户在不经意间安装了非法应用软件。非法应用软件通过修改合法应用软件的源码并在其中植入恶意代码后重新打包生成。修改他人应用软件的行为侵犯了原软件开发者的合法权益,同时其中包含的恶意代码会获取用户的信息,导致用户的隐私受到侵犯、财产受到损失。非法应用软件已经严重威胁到移动终端设备的安全。文章提出一种基于签名查验的判别技术,通过采集合法应用软件数字证书中的特征参数建立白名单库,将待测应用软件数字证书中对应的特征参数与白名单库中的数据进行比对,从而判定其合法性。实验结果表明,该技术检测速度快、准确率高,具有很强的实用性。 With the increasing popularity of mobile terminal devices, more and more users choose to install third-party application software to meet their different needs. Due to the lack of ability to discriminate against the legality of applications, most users have inadvertently installed illegal applications. Illegal application software is repackaged by modifying the source code of the legitimate application software and embedding malicious code in it. The modification of other people’s application software infringes the legitimate rights and interests of the original software developer, and the malicious code contained therein will obtain the user’s information, resulting in the user’s privacy violation and property loss. The illegal application software has seriously threatened the security of the mobile terminal device. This paper proposes a discriminant technology based on signature verification. The whitelist database is built by collecting the characteristic parameters in the digital certificate of the legal application software, and then the corresponding feature parameters in the digital certificate of the application software to be tested are compared with the data in the whitelist database to determine its legality. The experimental results show that the technology has high detection speed, high accuracy and strong practicability.
作者 李涛 时俊贤 胡爱群 LI Tao;SHI Junxian;HU Aiqun(School of Cyber Science and Engineering,Southeast University,Nanjing Jiangsu 210096,China)
出处 《信息网络安全》 CSCD 北大核心 2019年第11期56-62,共7页 Netinfo Security
基金 国家自然科学基金[61601113]
关键词 移动终端应用软件 合法性判别 数字证书 白名单 mobile terminal application software legality discrimination digital certificate whitelist
  • 相关文献

参考文献9

二级参考文献75

  • 1杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:48
  • 2Mariantonietta La Polla, Febio Martinelli, Daniele Sgandurra. A survey on security for mobile devices [J]. IEEE Communications Surveys & Tutorials, 2013, 15 (1): 446-471.
  • 3Thomas Blosing, Leonid Batyuk, Aubrey Derrick Schmidt, et al. An Android application sandbox system for suspicious soft- ware detection [C]//Proceedings of the 5th International Conference on Malicious and Unwanted Software. USA: IEEE Computer Society Press, 2010: 55-62.
  • 4Asaf Shabtai, Robert Moskovitch, Yuval Elovici, et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey [J]. Information Security TechnicalReport, 2009, 14 (1): 16-29.
  • 5Asaf Shabtai, Yuval Fledeh Uri Kanonov, et al. Google Android: A comprehensive security assessment [J]. IEEE Security and Privacy, 2010, 8 (2): 35-44.
  • 6Adrienne Porter Felt, Matthew Finifter, Erika Chin, et al. A survey of mobile malware in the wild [C]//Proceedings of the 1 st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York: ACM Press, 2011: 3-14.
  • 7Zheng Min, Patti& P C Lee, John C S Lui. ADAM: An automarie and extensible platform to stress test android anti-virus systems [C] //Proceefflngs of the 9th International Conference on Detection of Imrusions and Malware and Vulnerability Assessment. Berlin Heidelberg.. Springer-Verlag, 2012: 82-101.
  • 8Zhou Yajin, Jiang Xuxian. Dissecting Android malware: Chara-cterization and evolution [C] //Proceedings of the IEEE Symposium on Security and Privacy. USA: IEEE Computer Society Press, 2012: 95-109.
  • 9Zhou Wu, Zhou Yajin, Jiang Xuxian, et al. Detecting repae- kaged srnartphone applications in third-party Android market- places [C] //Proceedings of the Second ACM Conference on Data and Application Security and Privacy. New York: ACM Press, 2012: 317-326.
  • 10Mutz D, Valeur F, Vigna G. Anomalous system call detection [J]. ACM Transactions on Information and System Security, 2006, 9 (1): 61-93.

共引文献114

同被引文献6

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部