Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Wuhan University(Natural Science Edition)》 2015-01
Add to Favorite Get Latest Update

Android Malware Detection Research and Development

PENG Guojun;LI Jingwen;SUN Runkang;XIAO Yunchang;School of Computer,Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Eduction,Wuhan University;Law School,Remin University of China;  
In light of deteriorating security situation on the popular Android platform,there is a pressing need to develop effective solutions of Android malware detection.To address this issue,firstly Android malwares were systematically characterized from various aspects,including their installation methods,activation mechanisms as well as the nature of carried malicious payloads.Characterization and evolution of Android malware were the foundation of malware detection.Given the resource-constrained mobile phone environments and Android's special programming paradigm,several analysis techniques for detecting malware have been proposed:permission analysis,static analysis and dynamic analysis.The following malware detection solutions are primarily implemented using two methods:signature-based and heuristic-based.And then,a wide range of Android-based malware detection works were compared to evaluate the effectiveness of techniques for analyzing and identifying mobile malware.Finally,the direction of future studies in this field was presented on the basis of the assessment of the previous researches.
【Fund】: 国家自然科学基金(61202387 61202385 61373168 61103220);; 中国博士后科学基金(2012M510641);; 高等学校博士点专项科研基金(20120141110002);; 湖北省自然科学基金(2011CDB456)资助项目;; 武汉市晨光计划项目(2012710367)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 PENG Guojun1,2, SHAO Yuru2, WANG Taige2, ZHAN Xian2, ZHANG Huanguo1,2 1. Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, Wuhan 430072, Hubei, China; 2. School of Computer, Wuhan University, Wuhan 430072, Hubei, China;Research on Android Malware Detection and Interception Based on Behavior Monitoring[J];武汉大学自然科学学报(英文版);2012-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Shen Cailiang1,2,Tang Keping1,Yu Lifeng1,Fan Fuwei3,4(1.Zhejiang Industry Polytechnic College,Shaoxing 312000,China; 2.College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China; 3.Lishui Radio and Television University,Lishui 323000,China; 4.Key Lab of E-Business Security,Hangzhou Normal University,Hangzhou 310036,China);Android Privilege Escalation Vulnerability Attacks Detection[J];Telecommunications Science;2012-05
2 Qin Zhongyuan;Xu Yuqing;Liang Biao;Zhang Qunfang;Huang Jie;Information Security Research Center,Southeast University;Key Laboratory of Information Network Security of Ministry of Public Security;Nanjing Sample Technology Co. ,Ltd;Computer Department,Nanjing Institute of Artillery Corps;;An Android malware static detection method[J];Journal of Southeast University(Natural Science Edition);2013-06
3 Chen Tao;Gao Peng;Du Xuetao;Xue Shan;Yang Manzhi;China Mobile Group Design Institute Co.,Ltd.;Eversec (Beijing) Technology Co.,Ltd.;;Research on Operators Mobile Malware Protection Architecture and Key Technologies[J];Telecommunications Science;2014-01
4 LI Jing-hua;MU De-jun;YANG Ming-kun;HU Wei;School of Automation,Northwestern Polytechnical University;;Design on Android Malware Behavior Analysis System[J];Journal of Beijing University of Posts and Telecommunications;2014-S1
5 LU Kui;YANG Bing-bao;School of Computer Science and Engineering,Anhui University of Science and Technology;;Research on Image Recognition System Based on Android and SURF Algorithm[J];Journal of AnHui University of Science and Technology(Natural Science);2013-01
6 YANG Huan;ZHANG Yu-Qing;HU Yu-Pu;LIU Qi-Xu;State Key Laboratory of Integrated Services Networks,Xidian University;National Computer Network Intrusion Protection Center,University of Chinese Academy of Sciences;;A Malware Behavior Detection System of Android Applications Based on Multi-Class Features[J];Chinese Journal of Computers;2014-01
7 Jiao Sibei;Ying Lingyun;Yang Yi;Cheng Yao;Su Purui;Feng Dengguo;Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences;;An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J];Journal of Computer Research and Development;2014-07
8 DAI Wei;LIU Zhi;LIU Yi-he;School of Computer Science,Neijiang Normal University;School of Computer Science & Engineering,University of Electronic Science & Technology of China;;Binary code-based dynamic taint analysis[J];Application Research of Computers;2014-08
9 WEI Song-jie;YANG Ling;School of Computer Science and Engineering,Nanjing University of Science and Technology;;Android Malware Characterization Based on Static Analysis of Hierarchical API Usage[J];Computer Science;2015-01
10 YANG Huan;ZHANG Yu-qing;HU Yu-pu;LIU Qi-xu;State Key Laboratory of Integrated Services Networks, Xidian University;National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences;;Android malware detection method based on permission sequential pattern mining algorithm[J];Journal on Communications;2013-S1
China Proceedings of conference Full-text Database 2 Hits
1 LI Jing-hua;MU De-jun;YANG Ming-kun;HU Wei;School of Automation,Northwestern Polytechnical University;;Design on Android Malware Behavior Analysis System[A];[C];2013
2 Li Jinghua;Mu Dejun;School of Automation,Northwestern Polytechnical University;;Design of a Behavior-based Android Malware Analysis System[A];[C];2013
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 ZHANG Hejun,ZHANG Yue(Embedded System Lab,Graduate School at Shenzhen,Tsinghua University,Shenzhen 518055);Research and Application of Dynamic Link Mechanism in Linux[J];Computer Engineering;2006-22
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved