The Analysis of Android Malware Behaviors

被引:1
作者
Fan Yuhui [1 ]
Xu Ning [1 ]
机构
[1] Huainan Normal Univ, Dept Comp & Informat Engn, Huainan, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 03期
关键词
Android application; malware; permission; decompilation; static detection;
D O I
10.14257/ijsia.2015.9.3.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently the intelligent terminal based on the Android has occupied most of the market, and the number of malware aiming at Android platform is also increasing. The problems of security threats and privacy disclosure caused by malicious behaviors are becoming more serious. How to make the security assessments and metrics effectively for the security of application has become a research hotspot in recent years. In this paper, we use static behavioral analysis approach, the thesis analyzes Android malware, summarizes its malicious behaviors and its ways of stealing private data, and puts forward the methods of detection and prevention.
引用
收藏
页码:335 / 345
页数:11
相关论文
共 17 条
[1]  
[Anonymous], 2013, CNCERT CC CNCERT CC, P53
[2]  
Bose A, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P225
[3]  
Enck W., 2010, P OSDI 10 VANC CAN
[4]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[5]  
Fei W. F., 2012, STUDY DETECTION PROT
[6]   Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack [J].
Ham, You Joung ;
Moon, Daeyeol ;
Lee, Hyung-Woo ;
Lim, Jae Deok ;
Kim, Jeong Nyeo .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01) :231-246
[7]  
[黄颖 Huang Ying], 2014, [中南林业科技大学学报, Journal of Central South University of Forestry & Technology], V34, P106
[8]   A Novel Method to Avoid Malicious Applications on Android [J].
Lee, Sangho ;
Ju, Da Young .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05) :121-130
[9]  
Liu Chang-ping, 2010, Application Research of Computers, V27, P2611, DOI 10.3969/j.issn.1001-3695.2010.07.059
[10]  
Miettinen M, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P72