首页 | 本学科首页   官方微博 | 高级检索  
     

使用敏感路径识别方法分析安卓应用安全性
引用本文:缪小川,汪睿,许蕾,张卫丰,徐宝文.使用敏感路径识别方法分析安卓应用安全性[J].软件学报,2017,28(9):2248-2263.
作者姓名:缪小川  汪睿  许蕾  张卫丰  徐宝文
作者单位:计算机软件新技术国家重点实验室(南京大学), 江苏 南京 210023;南京大学 计算机科学与技术系, 江苏 南京 210023,计算机软件新技术国家重点实验室(南京大学), 江苏 南京 210023;南京大学 计算机科学与技术系, 江苏 南京 210023,计算机软件新技术国家重点实验室(南京大学), 江苏 南京 210023;南京大学 计算机科学与技术系, 江苏 南京 210023,南京邮电大学 计算机科学与技术学院, 江苏 南京 210023,计算机软件新技术国家重点实验室(南京大学), 江苏 南京 210023;南京大学 计算机科学与技术系, 江苏 南京 210023
基金项目:国家九七三重点基础研究发展规划项目基金(2014CB340702);国家自然科学基金(61272080,91418202,61403187)
摘    要:安卓系统在手机端操作系统中长期占据主导地位,但由于安卓系统开放共享的特性和不够严谨的第三方市场审核机制,安卓平台受到众多恶意应用的侵扰.本文结合静态程序分析和机器学习方法,提出了基于敏感路径识别的安卓应用安全性分析方法.首先,针对恶意应用中存在的恶意行为以及触发条件,定义了敏感路径.其次,针对安卓应用中存在大量组件间函数调用关系,提出了一种生成应用组件间函数调用关系图的方法.再次,由于提取出的敏感路径信息无法直接作为识别特征,实现了一种基于敏感路径信息抽象的特征提取方法.最后,从GooglePlay、豌豆荚、Drebin等来源收集了493个应用APK文件作为实验数据集,本文方法的准确率为97.97%,高于基于API-Feature的检测方法(90.47%),此外,在恶意应用和良性应用检测的精度、召回率、F度量等方面,本文方法均优于API-Feature方法.另外,实验表明APK文件大小会影响实验的结果,尤其体现在分析时间上(0-4MB大小的APK平均分析用时89秒;文件增大后,平均分析用时增长明显).

关 键 词:安卓恶意应用  敏感路径  组件函数调用关系  程序静态分析  特征抽象
收稿时间:2016/7/13 0:00:00
修稿时间:2016/9/4 0:00:00

Security Analysis for Android Applications Using Sensitive Path Identification
MIAO Xiao-Chuan,WANG Rui,XU Lei,ZHANG Wei-Feng and XU Bao-Wen.Security Analysis for Android Applications Using Sensitive Path Identification[J].Journal of Software,2017,28(9):2248-2263.
Authors:MIAO Xiao-Chuan  WANG Rui  XU Lei  ZHANG Wei-Feng and XU Bao-Wen
Affiliation:State Key Laboratory for Novel Software Technology(Nanjing University), Nanjing 210023, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China,State Key Laboratory for Novel Software Technology(Nanjing University), Nanjing 210023, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China,State Key Laboratory for Novel Software Technology(Nanjing University), Nanjing 210023, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China,School of Computer, Nanjing University of Posts and Telecommunication, Nanjing 210023, China and State Key Laboratory for Novel Software Technology(Nanjing University), Nanjing 210023, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China
Abstract:Android system dominates the mobile operating systems at present. Compared with iOS system, Android system is more open and has lots of third-party markets with loose audit mechanism. Therefore, there are more malwares in Android platform. In this paper, we propose the Android security analysis based on sensitive path identification, which includes the static analysis and machine learning methods. Firstly, since malicious behaviors in malwares have their trigger conditions, we give the definition of sensitive path. Secondly, we propose a method to generate the inter-component call graph based on APK files due to the fact that there are a lot of inter-component call relations in Android applications. Thirdly, since the sensitive paths cannot be directly used as features, we design a method to abstract the sensitive paths. Finally, we collected 493 applications APK files from Android markets and the existed data sets, such as Google Play, Wandoujia, and Drebin, to construct our benchmark, and our experiments indicate that our method has higher accuracy (97.97%) than the method based onAPI-Feature(90.47%), and its precision, recall and F-Measure are also better than API-Feature method.Furthermore, the scale of the APKfile has influence to the experiment results, especially in analyzing time (when the APK files are within 0-4MB, the average analyzing time is 89 seconds; and when the files become larger, the time increases significately).
Keywords:Android malware  sensitive path  inter-component commnication  program static analysis  feature abstract
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号