透過您的圖書館登入
IP:3.139.240.142
  • 學位論文

以動態使用者意圖分析偵測Android惡意程式

Android Malware Detection with Dynamic User Intention Based Analysis

指導教授 : 洪士灝

摘要


資料洩漏在Android上愈來愈嚴重,隨著Android平台上惡意程式的滋長,保護使用者的資料變得愈來愈難。一個惡意程式再Android上很容易取得使用者的資料,所以對於想要偷資料的開發者而言,只要寫個Android上的程式就可以透過Android框架獲得使用者隱私資訊。對於使用者而言,他很難知道Android上的程式是否依照他的意願使用他的隱私資料。這篇論文提供另外一個自動偵測惡意程式的方法。我們透過動態分析觀察使用者和程式的互動情形來判斷受測程式是否為惡意程式。最後,我們分析使用我們的方法,在一般程式和惡意程式的集合裡面,分別可以有多少的準確度,以及這個方法本身的限制。

並列摘要


Data leakage problem of Android apps is becoming more and more severe. Due to the enlarging Android ecology and the emerging of booming of various bytes of Android malwares, it is hard to keep user’s important data safe. For a malware, to steal important data from user is easy. The attacker can write an app and retrieve the user or device information from Android framework. Users with these apps installed is hard to know whether the application is using his or her data in an authorized way. In this paper, we provide a methodology to analyze out-going data with the observation of user-application interactions. With observation, we can get some information about the behavior of the app. Then we identify whether the app is benign or malicious by judging if an app is treating user’s data in a proper way. In brief, we want to tell if an app is treating user’s data in a right way by judging how the user interacts with the app. In the end, we show how this method performs by testing a numbers of applications, which are classified into two sets, normal set and malicious set respectively. With the evaluation of our method, we illustrate the performance of our system and its limitation.

並列關鍵字

Android Security Malware Automatic Testing Smartphone Data Leakage Privacy

參考文獻


[4] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth,“Taintdroid:An information flow tracking system for real-time privacy monitoring on smartphones,” Commun. ACM, vol. 57, no. 3, pp. 99–106, Mar. 2014. [Online].
Available: http://doi.acm.org/10.1145/2494522
[5] e. a. Elish, Karim O., “A static assurance analysis of android application,” Virginia Polytechnic Institute and State University, Tech. Rep., 2013.
[6] W.-C. W. Shih-Hao Hung, “Droiddolphin: a dynamic android malware detection framework using big data and machine learning,” in Proceedings of the 2014 Research in Adaptive and Convergent Systems, ser. RACS ’14.ACM, 2014.
[7] A. Desnos and P. Lantz, “Droidbox: An android application sandbox for dynamic analysis,” 2011.

延伸閱讀