透過您的圖書館登入
IP:3.148.233.130
  • 學位論文

Android 程式權限分析

Android Application Permission Analyze

指導教授 : 曾文貴

摘要


由於智慧型手機的普及,使得手機與生活中的關係越來越密切,許多人會使用手機上網、瀏覽電子郵件、購買商品等等關係到個人隱私資料的活動,將帳號密碼、信用卡號碼等個人資訊也儲存在手機上。Android是一個開放原始碼的作業系統,因為它開放的特性,許多手機商都採用這個系統,也因此Android作業系統的普及性逐年增高。Android的用戶可以輕鬆地從內建程式Google Play下載到各式各樣的app來使用,但是Google Play在app的安全檢查機制並沒有相當完善,所以使用者很容易就會暴露在資訊安全的危機當中。如果使用者沒有細心注意app的所有內容,很可能就會被存取到個人隱私資料,洩漏給惡意的第三方。我們實作出一個系統,從蒐集的資料建立資料庫,並且提供一個可以方便使用的app來幫助使用者檢測app所用到的手機資源,提供給使用者建議,幫助使用者判斷app的安全性。

關鍵字

Android HASH(0x19a29710) 權限

並列摘要


Since mobile phone plays an important role in life, more and more people surf the web pages, read e-mail, and shop on the internet by mobile phone. Users also store their personal information like address, account password, and credit card number in the phone. Android is an open source mobile operating system and many mobile phone manufacturers use it. Android users can easily download applications by a build-in software—Google Play. But Google Play has no the strict examination mechanism for the applications. For this reason, hackers can spread malicious applications to steal the personal information stored in the mobile phone. The users may download the malicious application and leak out the personal information unconsciously. We collect the applications, build a system to make database and write a examine program. The users can use the program based on the database to examine the application and get a clear and useful risk report to help them decide whether or not to install it.

並列關鍵字

Android HASH(0x19a28070) Permission

參考文獻


[4] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth "TaintDroid: an information-flowtracking system for realtime privacy monitoring on smartphones," in Proceeding of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010, pp. 393-408
[5] Farrukh Shahzad, Sohail Bhatti, Muhammad Shahzad, and Muddassar Farooq "In-Execution Malware Detection using Task Structures of Linux Processes," in Proceedings of the IEEE International Conference on Communication (ICC), 2011, pp. 1-6
[6] William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri "A study of android application security," in Proceedings of the 20th USENIX conference on Security, 2011, pp. 21-21
[7] David Barrera, H. Güneş Kayacik, Paul C. van Oorschot, and Anil Somayaji "A methodology for empirical analysis of permission-based security models and its application to Android," in Proceedings of the 17th ACM conference on Computer and communications security (CCS), 2010, pp. 73-84
[9] Mohammad Nauman, Sohail Khan, and Xinwen Zhang "Apex: Extending Android permission model and enforcement with user-defined runtime constraints," in Proceedings of the 5th ACM Symposium on Information, Computer and Commu-nications Security, 2010, pp. 328–332

被引用紀錄


蔡立倫(2014)。整合靜態分析及動態分析結果 作為機器學習標準的 Android惡意程式偵測系統〔碩士論文,國立交通大學〕。華藝線上圖書館。https://doi.org/10.6842/NCTU.2014.00934
蔡旻翮(2017)。結合量測重要函式與使用者互動程度的機器學習模式之Android 惡意軟體偵測系統〔碩士論文,國立交通大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0030-2212201712272164

延伸閱讀


國際替代計量