基于敏感路径识别的安卓应用安全性分析方法
[Abstract]:With the rapid improvement of mobile phone hardware and the improvement of mobile network environment quality, mobile phones are widely used in daily life. The high popularity of mobile phones has led to the prosperity of mobile phone application market, but also brought a large number of malicious mobile phone applications. Compared with iOS system, Android system is more open and has a large number of third-party markets with inadequate audit mechanism, which makes Android platform subject to more malicious applications. Android system security is closely watched by Android users, Android malicious application detection has become a hot issue of current research. There are four main methods to detect malicious applications: feature-based methods, static analysis, dynamic analysis and machine learning methods. Among them, the feature-based methods are more traditional, which are restricted by the library which records the malicious applications'signatures; static analysis methods, which have high coverage, but can not handle dynamic loading and other technologies; dynamic analysis methods. Analysis shows that the detection cost is high and the coverage rate of the execution path is low; the detection results of machine learning methods depend on the selection of the application in the data set. Each of the four basic methods has its own shortcomings. Combining the basic methods to detect malicious applications is the current trend in this field. Sensitive paths in applications are the characteristics of security analysis for Android applications based on sensitive path recognition. Firstly, for malicious behaviors and their triggering conditions in malicious applications, we propose the concept of sensitive paths. The API function for permission permission permission checking and the function related to dynamic loading, and the corresponding sensitive trigger are the preconditions for the sensitive behavior to occur. If there is no user interaction-related behavior in the execution path aiming at the sensitive behavior, the entry point of the execution path is regarded as the sensitive trigger of the behavior. Then the user interaction function which directly leads to the execution of the sensitive behavior is regarded as a sensitive trigger, and the sensitive path can indicate the sensitive behavior and the action that triggers the behavior. FlowDroid tool is used to get the function call diagram of the application, and then combined with Intent Filter in Manifest file, the Intent parameters defined in the application are analyzed to build the function call relationship between the components of the application, thus completing the construction of the function call diagram between components. Thirdly, the sensitive path information extracted can not be directly made. In order to extract the characteristics of sensitive paths, we propose an abstract feature extraction method. For sensitive triggers, the trigger functions are divided into three categories: hardware trigger, user trigger and system trigger. For sensitive behaviors, the permission privileges required by the API functions are divided according to the permission privileges. Finally, we collected 493 APK files from Google Play, Peapod, Drebin and other sources, and carried out experiments on the data set composed of these applications, and proposed three research questions. Question: The effect of this method, the influence of different sensitive path descriptions on the results, and the influence of APK file size in the data set on the results. The experimental results show that the detection accuracy of the proposed method is higher than that of traditional methods, and the high sensitive path descriptions can improve the analysis efficiency but affect the detection. Accuracy, APK file size has a certain impact on the detection results.
【学位授予单位】:南京大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP309;TP316
【相似文献】
相关期刊论文 前10条
1 李玉斌;API函数在Visual Basic中的应用[J];电子科技;2005年03期
2 刘志芳;杜瑞庆;;浅谈C语言中函数入门的讲解[J];中国科技信息;2007年13期
3 张锋;;浅谈C++中的虚函数[J];湖南工业职业技术学院学报;2008年01期
4 李艳芳;;C语言函数的教学探讨[J];湖南科技学院学报;2009年12期
5 潘莉;;C语言函数教学探讨[J];科技信息;2011年10期
6 黎路;;C语言函数教学探析[J];福建电脑;2011年11期
7 郑丽英;C~(++)的多态机制及虚函数实现技术[J];甘肃工业大学学报;1995年02期
8 郭招娣;API函数在VB中的应用[J];计算机应用与软件;2003年09期
9 石小云;C语言函数疑难问题探索[J];株洲师范高等专科学校学报;2004年02期
10 沈晓红;梁惺彦;;API函数在VB中的应用[J];南通大学学报(自然科学版);2005年04期
相关会议论文 前1条
1 潘新红;李庆忠;;用结构化函数内联方法处理结构上递归的NewsML查询[A];全国第十五届计算机科学与技术应用学术会议论文集[C];2003年
相关重要报纸文章 前6条
1 北京信息工程学院 张泽虹;C函数编程技巧[N];中国电脑教育报;2006年
2 孙顾天 笨笨;深入理解函数和过程的精髓[N];电脑报;2008年
3 ;名师讲解经典必考题型(二)[N];电脑报;2005年
4 郑州 牛霜霞;用MFC编制Windows打印程序[N];中国计算机报;2000年
5 广东 林志航;PB调用API函数技巧三则[N];电脑报;2001年
6 航天部二院 陈峰;OpenGL中文本的显示[N];计算机世界;2000年
相关硕士学位论文 前10条
1 刘阳;函数抽取重构的检测与分析[D];北京理工大学;2015年
2 谭慧;内核函数执行时间和路径的分析展现[D];北京理工大学;2014年
3 缪小川;基于敏感路径识别的安卓应用安全性分析方法[D];南京大学;2016年
4 杨羡环;基于函数调用序列的漏洞定位方法研究[D];华中科技大学;2013年
5 杜香燕;支持路由协议分析的内核函数调用图工具设计[D];首都师范大学;2014年
6 汤卫东;动态函数调用分析及其在内核模块逆向工程的应用[D];清华大学;2014年
7 赵丹;基于静态类型分析的Java程序函数调用图构建方法研究[D];湖南大学;2006年
8 刘星;基于函数调用图的恶意代码同源分析[D];国防科学技术大学;2012年
9 黄双玲;面向C/C++程序函数调用关系的静态分析方法研究[D];中国科学技术大学;2015年
10 张苗;进化测试中嵌套If-Else和函数调用结构的适值函数设计[D];西安电子科技大学;2008年
,本文编号:2185886
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2185886.html