首页> 外文期刊>Peer-to-peer networking and applications >Exposing mobile malware from the inside (or what is your mobile app really doing?) - Springer
【24h】

Exposing mobile malware from the inside (or what is your mobile app really doing?) - Springer

机译:从内部暴露移动恶意软件(或您的移动应用真正在做什么?)-Springer

获取原文
获取原文并翻译 | 示例

摘要

It is without a doubt that malware especially designed for modern mobile platforms is rapidly becoming a serious threat. The problem is further multiplexed by the growing convergence of wired, wireless and cellular networks, since virus writers can now develop sophisticated malicious software that is able to migrate across network domains. This is done in an effort to exploit vulnerabilities and services specific to each network. So far, research in dealing with this risk has concentrated on the Android platform and mainly considered static solutions rather than dynamic ones. Compelled by this fact, in this paper, we contribute a fully-fledged tool able to dynamically analyze any iOS software in terms of method invocation (i.e., which API methods the application invokes and under what order), and produce exploitable results that can be used to manually or automatically trace software’s behavior to decide if it contains malicious code or not. By employing real life malware we assessed our tool both manually, as well as, via heuristic techniques and the results we obtained seem highly accurate in detecting malicious code.
机译:毫无疑问,专门为现代移动平台设计的恶意软件正在迅速成为严重威胁。有线,无线和蜂窝网络的日益融合进一步加剧了该问题,因为病毒编写者现在可以开发能够在网络域之间迁移的复杂恶意软件。这样做是为了利用每个网络特有的漏洞和服务。到目前为止,针对这种风险的研究主要集中在Android平台上,并且主要考虑静态解决方案,而不是动态解决方案。受这一事实的驱使,在本文中,我们提供了一种成熟的工具,能够根据方法调用(即应用程序调用哪种API方法以及以什么顺序调用)动态分析任何iOS软件,并产生可被利用的结果。用于手动或自动跟踪软件的行为,以确定其是否包含恶意代码。通过使用现实生活中的恶意软件,我们既可以通过手动方式也可以通过启发式技术来评估我们的工具,我们获得的结果似乎在检测恶意代码方面非常准确。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号