基于行为的智能手机权限授予机制  

BEHAVIOUR-BASED PERMISSION GRANTING POLICY FOR SMART PHONE

在线阅读下载全文

作  者:谭丞[1] 夏虞斌[2] 臧斌宇[2] 

机构地区:[1]复旦大学软件学院,上海200433 [2]上海交通大学分布式与并行系统实验室,上海200240

出  处:《计算机应用与软件》2015年第8期261-265,287,共6页Computer Applications and Software

基  金:国家自然科学基金项目(61303011)

摘  要:随着智能手机的发展,软件的恶意行为在移动平台也呈现爆发性增长。面对正常行为和恶意行为混杂的情况,现有的权限机制缺乏相适应的粒度以及足够的信息区分相同程序中的不同行为。以"程序行为"为粒度对应用程序进行授权,并辅助以行为的上下文作为判定依据可以有效地分离程序正常行为与恶意行为。基于上述概念设计并实现Event Chain原型系统,具有追踪、建立程序行为及其上下文的能力。实验表明,该系统能够检测到Bg Serv、Fake Player等5个病毒家族的89个恶意软件中的恶意行为,并且具有低于10%的性能开销。With the development of smart phone,malicious behaviours in applications are also growing explosively on mobile platforms.However,existing permission schemes lack the adapted granularity and sufficient information to differentiate different behaviours from same application when facing the situation of malicious behaviours mixed in the normal ones. It is able to effectively sever the normal and malicious behaviours in application by taking the"applications behaviour"as the granularity to authorise the application assisted by using the context of the behaviour as discriminant basis. In this paper,we design and implement a prototype system of EventChain based on the above concept. It has the capability of tracking,as well as setting up the behaviours of application and its corresponding context. It is shown by experiments that the Event Chain system can detect the malicious behaviours in 89 malware from five malware families including BgServ,FakePlayer,etc.,and has the performance overhead less than 10%.

关 键 词:手机安全 权限管理 ANDROID 

分 类 号:TP391[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象