首页 | 本学科首页   官方微博 | 高级检索  
     

一种静态Android程序恶意性检测方法
引用本文:刘晓东,何加铭,冯 波,等. 一种静态Android程序恶意性检测方法[J]. 无线电通信技术, 2014, 0(2): 70-73
作者姓名:刘晓东  何加铭  冯 波  
作者单位:[1]宁波大学通信技术研究所,浙江宁波315211 [2]中国移动通信集团浙江有限公司,浙江宁波315042 [3]宁波新然电子信息科技发展有限公司,浙江宁波315211
基金项目:国家科技重大专项基金资助项目(2011ZX03002-004-02);浙江省移动网络应用技术重点实验室(2010E10005);浙江省新一代移动互联网用户端软件科技创新团队(2010R50009);浙江省重点科技创新团队项目(2012R10009-12)、(2012R10009-19)
摘    要:分析Android恶意程序行为特征,研究基于静态行为特征的Android程序恶意性检测方法及其实现方案,根据程序的静态行为特征来判断程序是否具有恶意性。针对Kirin方案做了2个方面的改进,一方面增加了对API的检测,细化了检测粒度,另一方面量化了不同静态行为特征的恶意性指数,通过计算程序的恶意性指数来分析程序的安全等级。实验结果表明,该方法能够有效地检测Android程序的恶意性程度。

关 键 词:Android平台  恶意软件  静态行为特征  恶意性指数

Malicious Android Application Detection Method Based on Static Behavior Characteristics
LIU Xiao-dong,HE Jia-ming,FENG Bo,SHI Zhi-hui. Malicious Android Application Detection Method Based on Static Behavior Characteristics[J]. Radio Communications Technology, 2014, 0(2): 70-73
Authors:LIU Xiao-dong  HE Jia-ming  FENG Bo  SHI Zhi-hui
Affiliation:1. Institute of Communication Technology, Ningbo University, Ningbo Zhejiang 315211 , China; 2. China Mobile Group Zhejiang Co., Ltd.Ningbo Branch, Ningbo Zhejiang 315042, China; 3. Ningbo SunRun Electronic Information Technology Development Limited Company, Ningbo Zhejiang 315211, China)
Abstract:This paper analyzes the malicious Android application behavior characteristics. It researches the detection method of malicious Android application based on static behavior characteristics and its implementation. The method can determine whether an application is malicious according to its static behavior characteristics. It improves Kirin in two aspects. Firstly, it adds the detection of APls,refines the detection granularity.Secondly,it quantifies the malicious value of different static behavior characteristics and analyzes the security level by calculating the malicious value of the application. Experimental results show that this detection method can effectively detect the security level of an application.
Keywords:Android platform  malicious application  static behavior characteristics  malicious value
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号