期刊文献+

Android安全机制分析与解决方案初探 被引量:44

The Security Mechanism Analysis and Probe into the Solution of Android OS
在线阅读 下载PDF
导出
摘要 Android是Google公司推出的手机操作系统。由于其开源、可编程软件框架、网络化设备的性质,Android易受到智能手机病毒的攻击。从Linux机制、Android特有的安全机制、其它保护机制三个层次全面深入地分析了Android OS保护手机安全的机制原理。Android设备在正常状态下是受到严密保护的,但攻击者很有可能找出某个内核模块或核心库的弱点,进而获得最高访问权限,进行攻击。所以,为进一步强化Android设备的安全性,使其能够妥善处理高风险性的威胁,研究了基于主机的入侵检测系统(HIDS)和SELinux(Security-Enhanced Linux),分别用于检测恶意软件和加强系统底层访问控制。 As an operating system for mobile device, Google' s Android-an open, programmable softwareframework-is vulnerable to typical smart-phone attacks. To date, there is no effective method available to prevent mobile threats, so mobile security still has a long way to go. Linux mechanism are introduced, Android-specific security mechanism and some other defense mechanisms, which may act as the defense mechanism of mobile security. An Android device in its normal state is well-guarded, however, it is possible for an attacker to identify vulnerability in one of the kernel modules or core libraries, acquire root access and carry out attack. So, to further harden Android devices and enable them to cope with high-risk threats, several security countermeasures are proposed. An overview of some of the most relevant approaches anchored in the area of machine learning is provided, anomaly detection, KBTA, as well as access control using SELinux.
出处 《科学技术与工程》 2011年第26期6350-6355,共6页 Science Technology and Engineering
基金 2010年粤港关键领域重点突破项目(2010498E12)资助
关键词 ANDROID 安全机制 异常检测 KBTA SELINUX Android OS security mechanism anomaly detection KBTA SELinux
作者简介 第一作者简介:廖明华(1984-),湖南省邵阳市人,硕士研究生,研究方向:Android应用开发、多媒体网络通信。
  • 相关文献

参考文献9

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38.
  • 2Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945.
  • 3Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009 ;7 (1) :53-54.
  • 4Shin W, Kwak S, Kiyomoto S, et al. A small but non-negligible flaw in the Android permission scheme. IEEE International Symposium on Policies for Distributed Systems and Net-works, 2010:109-110.
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly : a behavioral mal- ware detection framework for android devices. Intelligent Information Systems, 2011:7-22.
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto ma- licious behavior in mobile devices: knowledge-based approach. RAID, 2009.
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion Detection on mobile de- vices using the knowledge based temporal-abstraction method. Sys- tems and Software, 2010 ;83 (8) : 1527-1536.
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for in- ferring computer and network security alerts from timestamped, raw system metrics. Computer Virology, 2009 ; 8 ( 3 ) : 267-298.
  • 9Shabtai A, Fledel Y, Elovici Y. Securing Android-powered mobile de- vices using SELinux. IEEE Security & Privacy,2010:36-44.

同被引文献188

引证文献44

二级引证文献148

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部