首页> 外文期刊>Computer Science & Information Technology >Mapping System Level Behaviors with Android APIs Via System Call Dependence Graphs
【24h】

Mapping System Level Behaviors with Android APIs Via System Call Dependence Graphs

机译:通过系统调用依赖关系图使用Android API映射系统级行为

获取原文
       

摘要

Due to Android’s open source feature and low barriers to entry for developers, millions ofdevelopers and third-party organizations have been attracted into the Android ecosystem.However, over 90% of mobile malware are found targeted on Android. Though Androidprovides multiple security features and layers to protect user data and system resources, thereare still some over-privileged applications in Google Play Store or third-party Android appstores at wild. In this paper, we proposed an approach to map system level behavior andAndroid APIs, based on the observation that system level behaviors cannot be avoided butsensitive Android APIs could be evaded. To the best of our knowledge, our approach providesthe first work to map system level behavior and Android APIs through System Call DependenceGraphs. The study also shows that our approach can effectively identify potential permissionabusing, with almost negligible performance impact.
机译:由于Android的开源功能和对开发人员的低准入门槛,数以百万计的开发人员和第三方组织已被吸引到Android生态系统中。然而,发现90%以上的移动恶意软件都针对Android。尽管Android提供了多种安全功能和层来保护用户数据和系统资源,但Google Play商店或第三方Android应用商店中仍然存在一些过度特权的应用。在本文中,我们提出了一种映射系统级别行为和Android API的方法,它基于无法避免的系统级别行为而可以逃避敏感的Android API的观察。据我们所知,我们的方法提供了通过系统调用DependenceGraphs映射系统级行为和Android API的第一项工作。研究还表明,我们的方法可以有效地识别潜在的滥用权限,而对性能的影响几乎可以忽略不计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号