预览加载中,请您耐心等待几秒...
1/3
2/3
3/3

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

基于对比权限模式的安卓恶意软件检测方法(英文) Introduction Astheuseofsmartphonesandmobiledeviceshasincreased,sohastheprevalenceofAndroidmalware.Androidmalwarecancauseseriousdamagetoyourdeviceandpersonalinformation.Acommontechniqueusedbymalwareistoabusetherelevantpermissionsgrantedtotheapplicationinordertoexecutemaliciousactions.Thesepermissions,oraccesstocertainsystemresources,arerequestedbyapplicationswhentheyareinstalledinordertoenablecertainfeaturesorfunctions. ThefocusofthispaperistoproposeamethodfordetectingAndroidmalwarebasedonthecomparisonofpermissionmodels.Theproposedmethodidentifiesdifferencesbetweenthepermissionmodelsofbenignandmaliciousapplications.Themethodisnotbasedonsignaturesbututilizesmachinelearningalgorithms. Background Androidisanopen-sourceoperatingsystemthatisusedinavarietyofdifferentdevices,includingsmartphones,tablets,smartwatches,andTVboxes.OneofthestrengthsofAndroidisitsabilitytofacilitatethird-partyapplications.However,thiscanalsoposeasignificantsecurityrisk.Third-partyapplicationscanhaveaccesstoamultitudeofhardwareandsoftwareresources,suchassensors,datastorage,andthedevice’snetworkconnection. Toprotectusersfrommaliciousapplications,Androidimplementsapermissionssystemthatrequiresanapplicationtoobtainpermissiontoaccesscertainresources.Permissionsprovidealayerofsecuritybylimitingwhatanapplicationcanaccess.However,ifauserapprovesapermissionrequestforamaliciousapplication,thentheapplicationcanaccesssensitiveinformationandcausedamagetothedeviceanddata. Methodology TheproposedmethodfordetectingAndroidmalwareisbasedonthecomparisonofpermissionmodels.Thepermissionmodelisarepresentationofthepermissionsthatanapplicationrequirestooperate.Theproposedmethodcomparesthepermissionmodelofasuspectapplicationtoapermissionmodelofaknownbenignapplicationforsimilarfunctionality.Iftherearedifferencesbetweenthetwo,thentheapplicationisclassifiedasmalicious.Thestepsofthemethodareasfollows: 1.Obtainpermissionmodelsofbenignapplications. 2.Obtainpermissionmodelsofmaliciousapplications. 3.Prep