Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage
作者: Zheling ZengBogang LinYitao NiYongjia Chen
刊名: Journal of Electronics and Information Science, 2017, Vol.2 (1)
来源数据库: Clausius Scientific Press
DOI: 10.23977/jeis.2017.21007
关键词: Android systemMalicious applicationDetection methodResource access.
原始语种摘要: Nowadays, leakage of Android private information security is protected by application audit mechanism in formal application store and the Android mobile security mechanism. But because of insufficient of these two security, mechanism leakage of privacy incidents happened frequently. In this paper, we get the sensitive resources permission mapping table and sends the data permission mapping table according to the relationship between resources and permission and characteristics of sensitive resources. The judging rules and the detection process for the malicious application of privacy leakage are developed from these two mapping tables. Finally, 884application samples are tested and the experiment result demonstrates the advantages and disadvantages of the method.
全文获取路径: PDF下载  CSP 

  • tables 薄片
  • privacy 秘密
  • permission 许可
  • application 申请
  • malicious 恶意
  • security 可靠性
  • access 入口
  • protected 防护的
  • audit 检查
  • private 私有的