首页> 外文会议>International conference on information systems security >Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems
【24h】

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems

机译:在Android系统中进行基于相似度的劫持攻击检测和响应实验

获取原文

摘要

Hacker can launch hijacking attacks in Android systems to steal personal information of the targeted user. He/She stealthily injects into the foreground a hijacking Activity indistinguishable from the user interface at the right timing. Hijacking attacks take advantage of the user trust that this interface is real. Therefore, the hacker has chance to acquire user private information. In this paper, we compare user interfaces similarity between victim and hacking activities. Our approach has been proved to be effective in detecting Activity hijacking attacks with reasonable performance overheads and number of false positives. In the worst case, our solution generates 4.2% of false positives and incurs only 0.39% performance overhead on a CPU-bound micro-benchmark.
机译:黑客可以在Android系统中发起劫持攻击,以窃取目标用户的个人信息。他/她在适当的时机偷偷地在前台注入了与用户界面无法区分的劫持活动。劫持攻击利用了用户信任该接口是真实接口的优势。因此,黑客有机会获取用户私人信息。在本文中,我们比较了受害者和黑客活动之间的用户界面相似性。实践证明,我们的方法可以有效地检测活动劫持攻击,并具有合理的性能开销和误报次数。在最坏的情况下,我们的解决方案会产生4.2%的误报,并且在与CPU绑定的微型基准测试中只会产生0.39%的性能开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号