• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Lin, Li (Lin, Li.) | Ni, Jian (Ni, Jian.) | Hu, Jian (Hu, Jian.) | Zhang, Jianbiao (Zhang, Jianbiao.) (Scholars:张建标)

Indexed by:

EI Scopus

Abstract:

With the rapid development of Android-based smart phones and pads, android applications show explosive growth. Because third-party application market regulation is lax, many normal applications are embedded malicious code and then many security issues occur. The existing antivirus software cannot intercept malicious behaviors from those repackaged applications in many cases. To solve these problems, we propose a new method called RbacIP, which integrates RBAC into intercept and disposal process of malicious android applications. In RbacIP, the malicious behaviors of applications are monitored by inserting Linux kernel function call dynamically. Exploiting the Netlike technology, the information of malicious behaviors are feedback from the kernel layer to the user layer. On the user layer, depending on the roles assigned, android applications are authorized to the corresponding permissions. According to the characteristics of RBAC, it can achieve the minimum authorization for malicious applications. Meanwhile, to balance the user experience and his privacy protection needs, users are allowed to make fine-grained decision based on RBAC policy, rather than permit or prohibit. Finally, we implemented RbacIP in real android platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with traditional HIPS systems at the malicious programs detection performance and resource consumption. © Springer International Publishing Switzerland 2016.

Keyword:

Android (operating system) Smartphones Hooks Computer viruses Network security Application programs

Author Community:

  • [ 1 ] [Lin, Li]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 2 ] [Lin, Li]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 3 ] [Lin, Li]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China
  • [ 4 ] [Ni, Jian]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 5 ] [Ni, Jian]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 6 ] [Hu, Jian]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 7 ] [Hu, Jian]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 8 ] [Zhang, Jianbiao]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 9 ] [Zhang, Jianbiao]Beijing Key Laboratory of Trusted Computing, Beijing, China
  • [ 10 ] [Zhang, Jianbiao]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China

Reprint Author's Address:

  • [ni, jian]beijing key laboratory of trusted computing, beijing, china;;[ni, jian]college of computer science, beijing university of technology, beijing, china

Show more details

Related Keywords:

Related Article:

Source :

ISSN: 0302-9743

Year: 2016

Volume: 9565

Page: 214-225

Language: English

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 32

Online/Total:861/10607566
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.