浏览全部资源
扫码关注微信
[ "邓习海(1989-),男,中国科学院院信息工程研究所助理工程师,主要从事移动安全攻防方面研究工作。" ]
[ "冯维淼(1982-),男,中国科学院院信息工程研究所工程师,主要从事移动安全攻防方面研究工作。" ]
[ "马璐萍(1986-),女,中国科学院院信息工程研究所工程师,主要从事移动安全攻防方面研究工作。" ]
[ "李莹(1992-),女,中国科学院信息工程研究所硕士生,主要从事Android 系统安全方面研究工作。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-20
移动端阅览
邓习海, 冯维淼, 马璐萍, 等. 一种基于Android系统漏洞的通用攻击模型[J]. 电信科学, 2016,32(10):42-49.
Xihai DENG, Weimiao FENG, Luping MA, et al. A general attack model based on Android system vulnerability[J]. Telecommunications science, 2016, 32(10): 42-49.
邓习海, 冯维淼, 马璐萍, 等. 一种基于Android系统漏洞的通用攻击模型[J]. 电信科学, 2016,32(10):42-49. DOI: 10.11959/j.issn.1000-0801.2016254.
Xihai DENG, Weimiao FENG, Luping MA, et al. A general attack model based on Android system vulnerability[J]. Telecommunications science, 2016, 32(10): 42-49. DOI: 10.11959/j.issn.1000-0801.2016254.
Android系统中的各类漏洞给Android平台的安全性带来了巨大威胁。漏洞利用技术、移动操作系统安全、Android生态系统安全逐渐成为研究热点。从漏洞利用的角度出发,分析典型系统漏洞的利用过程,提出了一种Android系统漏洞利用的通用模型,并构建了一个漏洞利用有效性评估框架。验证结果表明,该模型能够较好地表述黑色产业链中利用漏洞实施攻击的过程。同时,有效性评估框架可以评估特定漏洞对Android生态系统安全性的影响。
Various kinds of vulnerabilities in Android system bring great threats to the platform. The vulnerability exploitation technology
the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry and academia. The exploitation of several typical system vulnerabilities was analyzed
a general model of Android system vulnerability exploitation was proposed
and a novel evaluation framework for the effectiveness of vulnerability exploitation was presented. The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. Furthermore
the evaluation framework can assess the influence of system vulnerabilities on the security of Android ecosystem.
GARTNER . Gartner says worldwide smart phone sales grew 3.9 percent in first quarter of 2016 [EB/OL ] . ( 2016 - 05 - 19 ] ) [ 2016 - 07 - 01 ] . http://www.gartner.com/newsroom/id/3323017 http://www.gartner.com/newsroom/id/3323017 .
CVE . Google android vulnerability statistics [EB/OL ] . ( 2016 - 07 - 29 ] ) [ 2016 - 07 - 29 ] . http://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224 http://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224 .
张嘉宾 . Android 应用的安全性研究 [J ] . 北京:北京邮电大学 , 2013 .
ZHANG J B . Security research of the Android Apps [J ] . Beijing:Beijing University of Posts and Telecommunications , 2013 .
WEI X , GOMEZ L , NEAMTIU I , et al . Permission evolution in the android ecosystem [C ] // 28th Annual Computer Security Applications Conference , Dec 3 - 7 , 2012 , Orlando, Florida, USA . New York : ACM Press , 2012 : 31 - 40 .
THOMAS D R , BERESFORD A R , RICE A . Security metrics for the android ecosystem [C ] // 5th Annual ACM CCS Workshopon Security and Privacy in Smartphones and Mobile Devices , October 12 - 15 , 2015 , Denver, Colorado, USA . New York : ACM Press , 2015 : 87 - 98 .
CVE . Calculating the score [EB/OL ] . [ 2016 - 07 - 29 ] . http://androidvulnerabilities.org/ http://androidvulnerabilities.org/ .
Android-VTS . Android vulnerability test suite [EB/OL ] . [ 2016 - 07 - 29 ] . https://github.com/AndroidVTS/android-vts https://github.com/AndroidVTS/android-vts .
PERLA E , OLDANI M . A guide to Kernel exploitation:attacking the core [M ] . New York : Syngress Publishing , 2010 .
蒋绍林 , 王金双 , 张涛 , 等 . Android 安全研究综述 [J ] . 计算机应用与软件 , 2012 , 29 ( 10 ): 205 - 210 .
JIANG S L , WANG J S , ZHANG T , et al . Overview of the Android safety research [J ] . Computer Application and Software , 2012 , 29 ( 10 ): 205 - 210 .
0
浏览量
991
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构