计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 324-328.doi: 10.11896/j.issn.1002-137X.2016.11A.076

• 信息安全 • 上一篇    下一篇

基于动态分析的Android应用程序安全研究

宁卓,胡婷,孙知信   

  1. 南京邮电大学物联网学院 南京210003,南京邮电大学物联网学院 南京210003,南京邮电大学物联网学院 南京210003
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61170276,61373135)资助

Security Survey on Android Application Based on Dynamic Analysis

NING Zhuo, HU Ting and SUN Zhi-xin   

  • Online:2018-12-01 Published:2018-12-01

摘要: Android操作系统由于其功能强大、开发方便,短短几年就已经成为全球第一份额的智能手机操作系统,同时也成为了恶意攻击的首选目标。首先简单介绍Android恶意软件及其检测方法;然后对Android安全中比较准确的动态分析技术进行综述,详细介绍各种动态分析技术的工作原理、技术方案以及技术的性能水平和检测效果,分析并比较它们各自的优缺点;最后,提出几个值得深入研究的技术方向。

关键词: Android,恶意软件,动态分析

Abstract: Because Android operating system is powerful and it is easy to develop ,it has not only become the world’s first share of the smartphone in the past few years,but also become a prime target for malicious attacks.In this paper,we briefly introduced the Android malware and its detection methods firstly.Then we summarized and analyzed some latest and accurate dynamic analysis techniques in Android security and introduced the technology works,technical solutions,technology performance levels and test results from multidimensional perspectives.Finally,we presented a few directions that are worthy of further research.

Key words: Android,Malware,Dynamic analysis

[1] Analytics S.Global Business Smartphone Quarterly TrackingQ4 2015.https://www.strategyanalytics.com/access-services/enterprise/mobile-workforce/market-data/report-detail/global-business-smartphone-quarterly-tracking-q4-2015#.VxX2J7IgIjY
[2] The 2015 U.S.Mobile App Report.https://www.comscore.com/Insights/Presentations-and-Whitepapers/2015/The-2015-US-Mobile-App-Report
[3] Labs M.Mobile Threat Report:What’s on the Horizon for 2016.http://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf
[4] Ded:Decompiling Android applications.http://siis.cse.psu.edu/ded
[5] Dex2Jar.Android decompiling with Dex2jar.http://code.google.com/p/dex2jar
[6] 屈延文.软件行为学[M].北京:电子工业出版社,2004
[7] Blsing T,Batyuk L,Schmidt A D,et al.An android application sandbox system for suspicious software detection[C]∥2010 5th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2010:55-62
[8] Enck W,Gilbert P,Han S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5
[9] Desnos A,Lantz P.Droidbox:An android application sandboxfor dynamic analysis.URL.https://code.google.com/p/droidbox,2014
[10] Yan L K,Yin H.Droidscope:seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis[C]∥Presented as part of the 21st USENIX Security Sympo-sium (USENIX Security 12).2012:569-584
[11] Portokalidis G,Homburg P,Anagnostakis K,et al.Paranoid Android:versatile protection for smartphones[C]∥Proceedings of the 26th Annual Computer Security Applications Conference.ACM,2010:347-356
[12] Weichselbaum L,Neugschwandtner M,Lindorfer M,et al.Andrubis:Android malware under the magnifying glass[R].Vienna University of Technology,Tech.Rep.TRISECLAB-0414,2014
[13] Rastogi V,Chen Y,Enck W.AppsPlayground:automatic security analysis of smartphone applications[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:209-220
[14] API Monitor.Rohitab Batra.http://www.rohitab.com/apimonitor
[15] Drozer-A Comprehensive Security and Attack Framework forAndroid.https://www.mwrinfosecurity.com/products/drozer
[16] Faruki P,Bhandari S,Laxmi V,et al.DroidAnalyst:SynergicApp Framework for Static and Dynamic App Analysis[M]∥Recent Advances in Computational Intelligence in Defense and Security.Springer International Publishing,2016:519-552
[17] Shabtai A,Kanonov U,Elovici Y,et al.“Andromaly”:a beha-vioral malware detection framework for android devices[J].Journal of Intelligent Information Systems,2012,38(1):161-190
[18] Burguera I,Zurutuza U,Nadjm-Tehrani S.Crowdroid:behavior-based malware detection system for android[C]∥Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2011:15-26
[19] Zheng C,Zhu S,Dai S,et al.Smartdroid:an automatic systemfor revealing ui-based trigger conditions in android applications[C]∥Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2012:93-104
[20] Tam K,Khan S J,Fattori A,et al.CopperDroid:Automatic Reconstruction of Android Malware Behaviors[C]∥NDSS.2015
[21] Spreitzenbarth M,Schreck T,Echtler F,et al.Mobile-Sandbox:combining static and dynamic analysis with machine-learning techniques[J].International Journal of Information Security,2015,14(2):141-153
[22] Zhang Y,Yang M,Yang Z,et al.Permission use analysis for vetting undesirable behaviors in android apps[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1828-1842
[23] Xu R,Sadi H,Anderson R.Aurasium:Practical policy enforcement for android applications[C]∥Presented as part of the 21st USENIX Security Symposium (USENIX Security 12).2012:539-552
[24] Zheng M,Sun M,Lui J.Droidtrace:A ptrace based android dynamic analysis system with forward execution capability[C]∥2014 International Wireless Communications and Mobile Computing Conference (IWCMC).IEEE,2014:128-133

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!