浏览全部资源
扫码关注微信
1. 北京邮电大学信息安全中心,北京 100876
2. 国家计算机网络应急技术处理协调中心,北京 100029
[ "许艳萍(1986-),女,安徽亳州人,北京邮电大学博士生,主要研究方向为移动互联网安全、Android智能终端应用安全。" ]
[ "马兆丰(1974-),男,甘肃镇原人,博士,北京邮电大学讲师,主要研究方向为移动互联网安全技术、云计算安全技术、数字版权管理。" ]
[ "王中华(1986-),男,山东聊城人,国家计算机网络应急技术处理协调中心工程师,主要研究方向为移动互联网安全、网络安全攻防演练。" ]
[ "钮心忻(1963-),女,浙江湖州人,北京邮电大学教授、博士生导师,主要研究方向为数字水印、信息隐藏、隐写分析。" ]
[ "杨义先(1961-),男,四川盐厅人,北京邮电大学教授、博士生导师,主要研究方向为密码学、计算机网络与信息安全。" ]
网络出版日期:2016-06,
纸质出版日期:2016-06-25
移动端阅览
许艳萍, 马兆丰, 王中华, 等. Android智能终端安全综述[J]. 通信学报, 2016,37(6):169-184.
Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, et al. Survey of security for Android smart terminal[J]. Journal on communications, 2016, 37(6): 169-184.
许艳萍, 马兆丰, 王中华, 等. Android智能终端安全综述[J]. 通信学报, 2016,37(6):169-184. DOI: 10.11959/j.issn.1000-436x.2016127.
Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, et al. Survey of security for Android smart terminal[J]. Journal on communications, 2016, 37(6): 169-184. DOI: 10.11959/j.issn.1000-436x.2016127.
针对Android智能终端安全问题,构建Android智能终端安全分层体系。首先从远程防盗、生物身份验证和硬件安全模块方面阐述了Android设备安全的安全威胁及保护措施,然后从无线安全网络、病毒传播查杀和防钓鱼攻击说明了Android网络安全的隐患及防范,之后从内核安全、本地库运行时环境安全和应用框架安全角度介绍了Android操作系统安全的研究内容,接着从静态检测和应用行为动态检测、应用加固和应用评估方面展示了Android应用安全的研究成果,接下来着眼于数据本身总结了Android数据的追踪、加密和备份等安全保护技术,最后结合实际需求展望了Android安全未来在安全增强框架、智能应用行为分析等方向的发展。
Aiming at the security
the layered security system was constructed.Firstly
the devices safety protection based on remote anti-theft
biometric identity verification and hardware security module was expounded.Secondly
network security referring to the wireless security network
virus propagation killing and anti-phishing was illustrated.Thirdly
the OS safety was introduced from the perspective of system kernel
runtime environment and application framework.Fourthly
application security was showed containing the reverse engineering static analysis
behavior dynamic analysis
safety reinforcement and safety assessment.Fifthly
the privacy data protection was summarized including tracking
encryption and backup.Finally
the future development direction was prospected on the security framework and intelligent behavior analysis.
360互联网安全中心 . 2015 mobile security status report [R ] . 2015 .
360 Internet Security Center . 2015 mobile security status report [R ] . 2015 .
360腾讯移动安全实验室 . 2015年上半年手机安全报告 [R ] . 2015 .
Tencent Mobile Security Laboratory . Mobile security report in the first half of 2015 [R ] . 2015 .
FAUKI P , BHAMAL A , LAXMI V , et al . Android security:a survey of issues,malware penetration,and defenses [J ] . Communications Surveys&Tutorials , 2015 , 17 ( 2 ): 998 - 1022 .
SEO S H , GUPTA A , MOHAMED S A , et al . Detecting mobile malware threats to homeland security through static analysis [J ] . Journal of Network and Computer Applications , 2014 , 38 ( 2 ): 43 - 53 .
冯登国 , 孙悦 , 张阳 . 信息安全体系结构 [M ] . 北京 : 清华大学出版社 , 2008 : 1 - 14 .
FENG D G , SUN Y , ZHANG Y . Information security architecture [M ] . Beijing : Tsinghua University PressPress , 2008 : 1 - 14 .
JANG J , W J Y , MOHAISEN A , et al . Andro-AutoPsy:anti-malware system based on similarity matching of malware and malware creator-centric information [J ] . Digital Investigation , 2015 , 14 ( 6 ): 17 - 35 .
NIKOLAY E . Android security internals:an in-depth guide to android's security architecture [M ] . No Starch Press , 2014 .
STEFFEN L , MATTHIAS L . Android security,pitfalls and lessons learned [C ] // The 28th International Symposium on Computer and Information Sciences . Berlin,Germany , 2013 : 409 - 417 .
KARI K , ELENA R , JAN ERIK E , et al . Old,new,borrowed,blue:a perspective on the evolution of mobile platform security architectures [C ] // The First ACM Conference on Data and Application Security and Privacy . New York,USA , 2011 : 13 - 24 .
LUBKE R , SCHUSTER D , SCHILL A . A framework for the development of mobile social software on Android [C ] // Third International Conference,MobiCASE 2011 . Los Angeles,CA,USA , 2011 : 207 - 225 .
HONG Y R , DONGSOO K . Security enhancement of smart phones for enterprises by applying mobile VPN technologies [C ] // Computational Science and Its Applications(ICCSA) . Santander,Spain , 2011 : 506 - 517 .
KORKMAZ I , METIN S K , GUREK A , et al . A cloud based and Android supported scalable home automation system [J ] . Computers&Electrical Engineering , 2015 , 43 ( 5 ): 112 - 128 .
PEIRAVIAN N , ZHU X Q , . Machine learning for Android malware detection using permission and API calls [C ] // IEEE 25th International Conference on Tools with Artificial Intelligence(ICTAI) . Herndon,VA , 2013 : 300 - 305 .
SHABTAI A , KANONOY U , ELOVICI Y , et al . Andromaly:a behavioral malware detection framework for android devices [J ] . Journal of Intelligent Information Systems , 2012 , 38 ( 1 ): 161 - 190 .
SCHREUDERS Z C , MCGILL T , PAYNE C . The state of the art of application restrictions and sandboxes:a survey of applicationoriented access controls and their shortfalls [J ] . Computers&Security , 2013 , 32 ( 2 ): 219 - 241
JUNFENG X , LI Z , DONG L , et al . Recommendable schemes of anti-decompilation for android applications [C ] // 2015 Ninth International Conference on Frontier of Computer Science and Technology(FCST) . Dalian , 2015 : 84 - 90 .
WANG Y , ZHENG J , SUN C , et al . Quantitative security risk assessment of Android permissions and applications [C ] // 27th Annual IFIP WG 11.3 Conference . Newark,NJ,USA , 2013 : 226 - 241 .
BERESFORS A R , RICE A , SKEHIN N , et al . MockDroid:trading privacy for application functionality on smartphones [C ] // The 12th Workshop on Mobile Computing Systems and Applications . New York,USA , 2011 : 49 - 54 .
ENCK W , GILBERT P CHUN , et al . Taintdroid:an information-flow tracking system for realtime privacy monitoring on smartphones [C ] // The 9th USENIX Conference on Operating Systems Design and Implementation . Berkeley,CA,USA , 2010 : 1 - 6 .
TEUFL P , THOMAS Z , CHRISTOF S . Mobile device encryption systems [C ] // 8th IFIP TC 11 International Conference . Auckland,New Zealand , 2013 : 203 - 216 .
HUANG T Y , WANG H , PENG C L , et al . A new remote desktop approach with mobile devices:design and implementation [M ] // Ubiquitous Computing Application and Wireless Sensor,2015 , 331 : 305 - 321 .
NAKAO K , NAKAMOTO Y , . Toward remote service invocation in Android [C ] // Ubiquitous Intelligence &Computing and 9th International Conference on Autonomic &Trusted Computing (UIC/ATC) . Fukuoka , 2012 : 612 - 617 .
BELKEDE M , GULHANE V , BAJAI P . Biometric mechanism for enhanced security of online transaction on Android system:a design approach [C ] // Advanced Communication Technology (ICACT) . Pyeong Chang , 2012 : 1193 - 1197 .
KHANDELWAL A , MOHAPTRA A K . An insight into the security issues and their solutions for android phones [C ] // Computing for Sustainable Global Development (INDIACom) . New Delhi , 2015 : 106 - 109 .
MA L , TEYMORIAN A Y , CHENG X . A hybrid access point protection framework for commodity Wi-Fi networks [C ] // The 27th Conference on Computer Communications . Phoenix,AZ , 2008 : 1894 - 1902 .
WANG D , ZHOU M . A framework to test reliability and security of Wi-Fi device [C ] // Electronic Packaging Technology(ICEPT) . Chengdu , 2014 : 953 - 958 .
YERIMA S Y , SEZER S , MCWILLIAN G . Analysis of Bayesian classification-based approaches for Android malware detection [J ] . Information Security,IET , 2013 , 8 ( 1 ): 121 - 129 .
SHINA S , ANITHA R , NATARAJAN V . Android based malware detection using a multifeature collaborative decision fusion approach [J ] . Neurocomputing , 2015 , 151 ( 3 ): 905 - 912 .
FELT A P , WAGNER D . Phishing on mobile devices [M ] . NA , 2011 .
BOTTAZZI G , CASALICCHIO E , CINGOLANI D , et al . MP-Shield:a framework for phishing detection in mobile devices [C ] // 2015 IEEE International Conference on Computer and Information Technology,Ubiquitous Computing and Communications;Dependable,Autonomic and Secure Computing,Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) . IEEE , 2015 : 1977 - 1983 .
WU L , DU X , WU J . MobiFish:a lightweight anti-phishing scheme for mobile phones [C ] // 2014 23rd International Conference on Computer Communication and Networks . IEEE , 2014 : 1 - 8 .
HE M , HORNG S J , FAN P , et al . An efficient phishing webpage detector [J ] . Expert Systems with Applications , 2011 , 38 ( 10 ): 12018 - 12027 .
BASNET R , MUKKAMALA S , SUNG A H . Detection of phishing attacks:a machine learning approach [M ] // Soft Computing Applications in Industry . Springer Berlin Heidelberg , 2008 : 373 - 383 .
SHABTAI A , FLEDEL Y , ELOVICI Y . Securing Android-powered mobile devices using SELinux [J ] . Security &Privacy , 2010 , 8 ( 3 ): 36 - 44 .
SMANEY S , CRAIG R . Security enhanced (SE) android:bringing flexible MAC to Android [C ] // The 20th Annual Network and Distributed System Security Symposium . Switzerland , 2013 : 20 - 38 .
AVD Android漏洞库 [EB/OL ] . http://android.scap.org.cn/avdview.html http://android.scap.org.cn/avdview.html .
AVD Android vulnerability database [EB/OL ] . http://android.scap.org.cn/avdview.html http://android.scap.org.cn/avdview.html .
ZHANG W , CAO C , LIU W , et al . Vulnerability mining techniques in Android platform [J ] . CCIS-13 , 2013 , 52 ( 1391 ): 535 - 540 .
STIRPARO P , FOVINO I N , KOUNELIS I . Data-in-use leakages from Android memory-test and analysis [C ] // Wireless and Mobile Computing.Networking and Communications(WiMob) . Lyon , 2013 : 701 - 708 .
SHAHRIAR H , NORTH S , MAWANGI E . Testing of memory leak in Android applications [C ] // High-Assurance Systems Engineering (HASE) . Miami Beach,FL , 2014 : 176 - 183 .
ALESSANDRO A , ALESSIO M , MAURO M , et al . Breaking and fixing the android launching flow [J ] . Computers&Security , 2013 , 39 : 104 - 115 .
DAVI L , DMITRIENKO A , SADEGHI A . Privilege escalation attacks on Android [M ] . Information Security . Springer Berlin Heidelberg , 2010 : 346 - 360 .
BUGIEL S , DAVI L , DMITRIENKO A , et al . Poster:the quest for security against privilege escalation attacks on Android [C ] // The 18th ACM Conference on Computer and Communications Security . ACM , 2011 : 741 - 744 .
DEMERTZIS K , ILIADIS L . SAME:an intelligent anti-malware extension for android ART virtual machine [C ] // Computational Collective Intelligence 7th International Conference,ICCCI 2015 . Madrid,Spain , 2015 : 235 - 245 .
CHIN E , FELT A P , GREENWOOD K , et al . Analyzing inter-application communication in android [C ] // The 9th International Conference on Mobile Systems,Applications,and Services . New York,USA , 2011 : 239 - 252 .
ENCK W , ONGTANG M , MCDANIEL P . Understanding Android security [J ] . IEEE Security&Privacy , 2009 , 7 ( 1 ): 50 - 57 .
傅建明 , 李鹏伟 , 易乔 . Android组件间通信的安全缺陷静态检测方法 [J ] . 华中科技大学学报(自然科学版) , 2013 , 41 : 259 - 264 .
FU J M , LI P W , YI Q . A static detection of security detects between inter-components’communication [J ] . Journal of Huazhong University of Science and Technology (Natural Science Edition) , 2013 , 41 : 259 - 264 .
FANG Z R , HAN W L , LI Y J . Permission based Android security:issues and countermeasures [J ] . Computers &Security , 2014 , 43 ( 6 ): 205 - 218 .
SCHLEGEL R , ZHANG K , ZHOU X , et al . Soundcomber:a stealthy and context-aware sound trojan for smartphones [C ] // NDSS . San Diego,California,USA , 2011 : 17 - 33 .
GARCE M , ZHOU Y , WANG Z , et al . Systematic detection of capability leaks in stock Android smartphones [C ] // The 19th Network and Distributed System Security Symposium(NDSS 2012) . San Diego,CA , 2012 .
ONGTANG M , MCLAUGHLIN S , ENCK W , et al . Semantically rich application-centric security in Android [C ] // In ACSAC '09.Computer Security Applications Conference . Honolulu,HI , 2009 : 340 - 349 .
BUGIEL S , DAVI L , DMITRIENKO A , et al . XManDroid:a new Android evolution to mitigate privilege escalation attacks [R ] . Technical Report TR-2011-04,Technische Universitat Darmstadt.Germany , 2011 : 1 - 17 .
DIETZ M , SHEKHAR S , PISETSKY Y , et al . QUIRE:lightweight provenance for smart phone operating systems [C ] // The 20th USENIX Conference on Security . USENIX Association Berkeley,CA,USA , 2011 :23.
LU L , LI Z C , WU Z Y , et al . CHEX:statically vetting android apps for component hijacking vulnerability [C ] // ACM Conference on Computer and Communications Security . New York,USA , 2012 : 229 - 240 .
ZHONG Y , XIN Z , MAO B , et al . DroidAlarm:an all-sided static analysis tool for android privilege-escalation malware [C ] // The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security . New York,USA , 2013 : 353 - 358 .
ENCK W , ONGTANG M , MCDANIEL P . On lightweight mobile phone application certification [C ] // ACM Conference on Computer and Communications Security . Chicago,USA , 2009 : 235 - 245 .
NAUMAN M , KHAN S , ZHANG X . Apex:extending Android permission model and enforcement with user-defined runtime constraints [C ] // The 5th ACM Symposium on Information,Computer and Communications Security . New York,USA , 2010 : 328 - 332 .
FELT A , CHIN E , HANNA S , et al . Android permissions demystified [C ] // The 18th ACM Conference on Computer and Communications Security . New York,USA , 2011 : 627 - 637 .
GENEIATAKIS D , FOVINO I N , KOUNELIS I , et al . A permission verification approach for android mobile applications [J ] . Computers&Security , 2015 , 49 ( 3 ): 192 - 205 .
HOLAVANALLI S , MANUEL D , NANJUNDASWAMY V , et al . Flow permissions for Android [C ] // 2013 IEEE/ACM 28th International Conference on Automated Software Engineering(ASE) . Silicon Valley,CA , 2013 : 652 - 657 .
BARRERA D , KAYACIK H G , OORSCHOT P C , et al . A methodology for empirical analysis of permission-based security models and its application to Android [C ] // The 17th ACM Conference on Computer and Communications Security . New York,NY,USA , 2010 : 627 - 637 .
GRACE M , ZHOU Y J , ZHANG Q , et al . RiskRanker:scalable and accurate zero-day Android malware detection [C ] // The 10th International Conference on Mobile Systems,Applications,and Services(MobiSys) . ACM,Lake District,UK , 2012 : 281 - 294 .
ZHENG M , SUN M , LUI J . Droid analytics:a signature based analytic system to collect,extract,analyze and associate Android malware [C ] // The 12th IEEE International Conference on Trust Security and Privacy in Computing and Communications . 2013 : 163 - 271 .
ENCK W , OCTEAU D , MCDANIEL P , et al . A study of Android application security [C ] // The 20th USENIX Conference on Security . USENIX Association Berkeley,CA,USA , 2011 :1175.
FEIZOLLAH A , ANUAR N B , SALLEH R , et al . A review on feature selection in mobile malware detection review article [J ] . Digital Investigation , 2015 , 13 ( 6 ): 22 - 37 .
SHABTAI A , FLEDEL Y , ELOVICI Y . Automated static code analysis for classifying Android applications using machine learning [C ] // The 2010 International Conference on Computational Intelligence and Security(CIS) . Nanning,China , 2010 : 329 - 333 .
SARMA B P , LI N , GATES C , et al . Android permissions:a perspective combining risks and benefits [C ] // The 17th ACM Symposium on Access Control Models and Technologies . New York,USA , 2012 : 13 - 22 .
SATO R , CHIBA D , GOTO S . Detecting Android malware by analyzing manifest files [C ] // The Asia-Pacific Advanced Network . Tokyo , 2013 : 23 - 31 .
WU D J , MAO C H , WEI T E , et al . DroidMat:Android malware detection through manifest and API calls tracing [C ] // Seventh Asia Joint Conference on Information Security(Asia JCIS) . Tokyo , 2012 : 62 - 69 .
WEICHSELBAUM L , NEUGSCHWANDTNER M , LINDORFOR M , et al . Andrubis:Android malware under the magnifying glass [R ] . Vienna University of Technology , 2014 .TRI-SECLAB-0414-001.
HOU Y , WANG Z , ZHOU W , et al . Hey,you,get off of my market:detecting malicious apps in official and alternative android markets [C ] // The 19th Annual Network and Distributed System Security Symposium(NDSS) . San Diego , 2012 .
AU K W Y , ZHOU Y F , HUAGN Z , et al . Pscout:analyzing the android permission specification [C ] // The 2012 ACM Conference on Computer and Communications Security . New York,USA , 2012 : 217 - 228 .
XU R , SAIDI H , ANDERSON R . Aurasium:practical policy enforcement for Android application [C ] // The 21st USENIX Conference on Security Symposium . USENIX Association Berkeley,CA,USA , 2012 :27.
ZHANG M , DUAN Y , YIN H , et al . Semantics-aware Android malware classification using weighted contextual API dependency graphs [C ] // The 2014 ACM SIGSAC Conference on Computer and Communications Security . New York,USA , 2014 : 1105 - 1116 .
ARZT S , RASTHOFER S , FRITZ C , et al . FlowDroid:precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for Android apps [C ] // The 35th ACM SIGPLAN Conference on Programming Language Design and Implementation . 2014 : 259 - 269 .
HU G , LI T , DONG H , et al . Malicious code detection for Android using instruction signatures [C ] // IEEE 8th International Symposium on Service Oriented System Engineering . Oxford , 2014 : 332 - 337 .
SCHMIDT A D , BYE R , SCHMIDT H G , et al . Static analysis of executables for collaborative malware detection on Android [C ] // IEEE International Conference on Communications . Dresden , 2009 : 1 - 5 .
CEN L , GATES C , et al . A probabilistic discriminative model for Android malware detection with decompiled source code [C ] // IEEE Transactions on Dependable and Secure Computing . 2013 : 1 - 14 .
ZHOU W , ZHOU Y , JIANG X , et al . Detecting repackaged smartphone applications in third-party android marketplaces [C ] // The Second ACM Conference on Data and Application Security and Privacy . New York,USA , 2012 : 317 - 326 .
CRUSSELL J , GIBLER C , CHEN H . Attack of the clones:detecting cloned applications on Android markets [C ] // Proceedings of ESORICS . Berlin,Germany , 2012 : 37 - 54 .
HANNA S , HUANG L , WU E , et al . Juxtapp:a scalable system for detecting code reuse among Android applications [C ] // The 9th International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment . Berlin,Germany , 2013 : 62 - 81 .
LIN Y D , LAI Y C , CHEN C H , et al . Identifying Android malicious repackaged applications by thread-grained system call sequences [J ] . Computers &Security , 2013 , 39 ( 12 ): 340 - 350 .
文伟平 , 梅瑞 , 宁戈 , 等 . Android恶意软件检测技术分析和应用研究 [J ] . 通信学报 , 2014 , 35 ( 8 ): 79 - 85 .
WEN W P , MEI R , NING G , et al . Malware detection technology analysis and applied research of android platform [J ] . Journal on Communications , 2014 , 35 ( 8 ): 79 - 85 .
BURGUERA I , ZURATUZA U , et al . Crowdroid:behavior-based malware detection system for Android [C ] // The 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices . New York,USA , 2011 : 15 - 26 .
BLASING T , BATYUK L , SCHMIDT A D , et al . An Android application sandbox system for suspicious software detection [C ] // 5th International Conference on Malicious and Unwanted Software (MALWARE) . Nancy,Lorraine , 2010 : 55 - 62 .
ZHOU Y J , ZHANG X W , et al . Taming information-stealing smartphone applications(on Android) [C ] // The 4th International Conference on Trust and Trustworthy Computing . Berlin,Germany , 2011 : 93 - 107 .
HORNYACK P , HAN S , JUNG J , et al . These aren’t the droids you’re looking for:retrofitting android to protect data from imperious applications [C ] // The 18th ACM Conference on Computer and Communications Security . New York,USA , 2011 : 639 - 652 .
GIBLER C , CRUSSELL J , ERICKSON J , et al . AndroidLeaks:automatically detecting potential privacy leaks in Android applications on a large scale [C ] // The 5th International Conference on Trust and Trustworthy Computing . Berlin,Germany , 2012 : 291 - 307 .
SCHRECKLING D , POSEGGA J , et al . Kynoid:real-time enforcement of fine-grained,user-defined,and data-centric security policies for Android [C ] // WISTP'12 The 6th IFIP WG 11.2 International Conference on Information Security Theory and Practice . Berlin,Germany , 2012 : 208 - 223 .
WANG Z H , MURMURIA R , STAVROU A . Implementing and optimizing an encryption file system on Android [C ] // The 2012 IEEE 13th International Conference on Mobile Data Management . Washington,DC,USA , 2012 : 52 - 62 .
TAN G W , OOI K B , CHONG S C , et al . NFC mobile credit card:the next frontier of mobile payment [J ] . Telematics and Informatics , 2014 , 31 ( 2 ): 292 - 307 .
王志强 , 刘奇旭 , 张玉清 . Android平台NFC应用漏洞挖掘技术研究 [J ] . 通信学报 , 2014 , 35 ( z2 ): 118 - 123 .
WANG Z Q , LIU Q X , ZHANG Y Q . Research of discovering vulnerabilities of NFC applications on Android platform [J ] . Journal on Communications , 2014 , 35 ( z2 ): 118 - 123 .
0
浏览量
2444
下载量
5
CSCD
关联资源
相关文章
相关作者
相关机构