• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Lin, Li (Lin, Li.) | Ni, Jian (Ni, Jian.) | Hu, Jian (Hu, Jian.) | Zhang, Jianbiao (Zhang, Jianbiao.) (学者:张建标)

收录:

EI Scopus

摘要:

With the rapid development of Android-based smart phones and pads, android applications show explosive growth. Because third-party application market regulation is lax, many normal applications are embedded malicious code and then many security issues occur. The existing antivirus software cannot intercept malicious behaviors from those repackaged applications in many cases. To solve these problems, we propose a new method called RbacIP, which integrates RBAC into intercept and disposal process of malicious android applications. In RbacIP, the malicious behaviors of applications are monitored by inserting Linux kernel function call dynamically. Exploiting the Netlike technology, the information of malicious behaviors are feedback from the kernel layer to the user layer. On the user layer, depending on the roles assigned, android applications are authorized to the corresponding permissions. According to the characteristics of RBAC, it can achieve the minimum authorization for malicious applications. Meanwhile, to balance the user experience and his privacy protection needs, users are allowed to make fine-grained decision based on RBAC policy, rather than permit or prohibit. Finally, we implemented RbacIP in real android platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with traditional HIPS systems at the malicious programs detection performance and resource consumption. © Springer International Publishing Switzerland 2016.

关键词:

Android (operating system) Application programs Computer viruses Hooks Network security Smartphones

作者机构:

  • [ 1 ] [Lin, Li]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 2 ] [Lin, Li]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 3 ] [Lin, Li]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China
  • [ 4 ] [Ni, Jian]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 5 ] [Ni, Jian]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 6 ] [Hu, Jian]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 7 ] [Hu, Jian]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 8 ] [Zhang, Jianbiao]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 9 ] [Zhang, Jianbiao]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 10 ] [Zhang, Jianbiao]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China

通讯作者信息:

  • [ni, jian]beijing key laboratory of trusted computing, beijing, china;;[ni, jian]college of computer science, beijing university of technology, beijing, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

ISSN: 0302-9743

年份: 2016

卷: 9565

页码: 214-225

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 1

在线人数/总访问数:170/3611186
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司