期刊文献+

基于静态和动态分析的Android短信拦截马自动分析取证方法研究 被引量:1

Android Malware Automatic Analysis and Evidence Collection Method Based on Static Analysis and Dynamic Analysis
在线阅读 下载PDF
导出
摘要 虽然移动互联时代智能终端应用进一步普及,但随之也带来了移动端恶意代码等威胁,这些威胁影响了公民隐私和财产安全。Android系统由于自身特性,成为了恶意代码攻击的主要目标。犯罪分子利用恶意代码获取受害人隐私信息,进一步实施盗窃、诈骗等犯罪活动。基层办案人员对Android恶意代码分析技术的掌握程度有待提高,需要自动化的分析取证工具辅助警方发现犯罪线索,提高工作效率,真正做到全链条打击。在深入分析短信拦截马代码特征的基础上,结合静态和动态分析技术进行自动分析提取关键信息,为进一步的取证溯源提供线索。 In the mobile Internet era, the application of intelligent terminal becomes much more popularity. But it also brings the malicious malware, affecting the safety of citizens and property. Android has its own characteristics, and becomes the main target of malicious malware attacks. Criminals use malware to obtain the victim's privacy information, even theft, fraud and other criminal activities. The investigators of the Android malware analysis techniques need automated analysis and forensic tools to find crime clues and structure of the whole evidence chain. We analysed the characteristics of SMS interception Trojan, and then utilized static and dynamic analysis techniques to automatically analyze. Finally, we extracted the key information and found clues for evidence tracing.
作者 张璇 杜强 ZHANG Xuan DU Qiang(Network Security and Law Enforcement of Investigation Department, Shandong Police College,Jinan 260014, China Licheng Branch of Jinan Public Security Bureau,Jinan 250100,China)
出处 《计算机科学》 CSCD 北大核心 2016年第B12期30-34,共5页 Computer Science
基金 本文受山东省科技发展计划项目:基于大数据分析的云取证系统研究与实现(2014GGX101004)资助.
关键词 ANDROID 取证 短信拦截马 静态分析 动态分析 Android, digital forensics, SMS interception trojan, Static analysis, Dynamic analysis
作者简介 张璇(1980-),女,硕士,讲师,主要研究方向为电子数据取证、网络犯罪侦查,E-mail:zx@sdpc.edu.cn; 杜强(1972-),男,工程师,主要研究方向为电子数据取证、网络犯罪侦查。
  • 相关文献

参考文献4

二级参考文献262

  • 1Steven M P.Contrary to what you've heard,Android is almost impenetrable to malware[EB/OL].[2014-06-23].http://qz.com/131436/contrary-to-what-youveheard-android-is-almost-impenetrable-to-malware/.
  • 2Zhou Y,Jiang X.An analysis of the AnserverBot trojan[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf.
  • 3F-Secure’s Security Labs.Trojan:Android/BaseBridge.A[EB/OL].[2014-06-23].http://www.fsecure.com/v-descs/trojan_android_basebridge.shtml.
  • 4F-Secure’s Security Labs.Droid KungFu Utilizes an Update Attack[EB/OL].(2011-10-05)[2014-06-23].http://www.f-secure.com/weblog/archives/00002259.html.
  • 5Jiang X X.Security Alert:New Stealthy Android Spyware-Plankton-Found in Official Android Market[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/Plankton/.
  • 6Goegre code.Asroot[EB/OL].[2012-02-07].http://code.google.com/p/flashrec/source/browse/#svn%2Ftrunk%2Fandroid-root.
  • 7SEBASTIAN.Android trickery[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/07/androidtrickery.html.
  • 8SEBASTIAN.Droid2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/08/droid2.html.
  • 9SEBASTIAN.Zimperlich sources[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/02/zimperlich-sources.html.
  • 10SEBASTIAN.adb trickery#2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/01/adbtrickery-again.html.

共引文献255

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部