浏览全部资源
扫码关注微信
1. 中国移动通信集团设计院有限公司 北京 100080
2. 恒安嘉新(北京)科技有限公司 北京 100191
[ "陈涛,男,博士,中国移动通信集团设计院有限公司高级工程师,CCF会员,主要研究方向为信息安全评估、下一代可信网络。" ]
[ "高鹏,男,博士,中国移动通信集团设计院有限公司研究所教授级高级工程师、所长,主要研究方向为无线通信网安全。" ]
[ "杜雪涛,女,中国移动通信集团设计院有限公司高级工程师,主要研究方向为信息安全评估。" ]
[ "薛姗,女,中国移动通信集团设计院有限公司助理工程师,主要研究方向为移动互联网安全。" ]
[ "杨满智,男,博士,恒安嘉新(北京)科技有限公司高级工程师、技术总监,主要研究方向为移动互联网安全。" ]
网络出版日期:2014-01,
纸质出版日期:2014-01-20
移动端阅览
陈涛, 高鹏, 杜雪涛, 等. 运营商恶意软件防护体系与关键技术研究[J]. 电信科学, 2014,30(1):83-88.
Tao Chen, Peng Gao, Xuetao Du, et al. Research on Operators Mobile Malware Protection Architecture and Key Technologies[J]. Telecommunications science, 2014, 30(1): 83-88.
陈涛, 高鹏, 杜雪涛, 等. 运营商恶意软件防护体系与关键技术研究[J]. 电信科学, 2014,30(1):83-88. DOI: 10.3969/j.issn.1000-0801.2014.01.013.
Tao Chen, Peng Gao, Xuetao Du, et al. Research on Operators Mobile Malware Protection Architecture and Key Technologies[J]. Telecommunications science, 2014, 30(1): 83-88. DOI: 10.3969/j.issn.1000-0801.2014.01.013.
近年来,运营商网络中恶意软件的数量急剧增加,严重威胁到移动互联网的安全。在综述现有恶意软件研判和防护技术的基础上,从运营商的角度,提出了网络侧与客户端联动的恶意软件防护体系,并研究了关键实施技术,为安全工程人员提供参考。
In recent years
there is a rapid growth of malware on operators network. It severely threats security of mobile internet. Based on reviewing of existing malware protection technologies
mobile malware protection architecture including both network side and terminal side technology and their interaction mechanism was proposed. Some key implementation technologies for engineer's reference were also studied.
Jiang X . Dissecting Android malware: characterization and evolution . Proceedings of 2012 IEEE Symp on Security and Privacy , Francisco,California , 2012 : 95 ~ 109
Erturk E . Two trends in mobile malware: financial motives and transitioning from static to dynamic analysis . International Journal of Intelligent Computing Research(IJICR) , 2012 , 3 ( 3/4 ): 325 ~ 329
Venugopal D . An efficient signature representation and matching method for mobile devices . Proceedings of 2nd Annual International Workshop on Wireless Internet(WICON'06) , Boston,MA,United States , 2006
Zhou W , Zhou Y J . Detection of repackaged smartphone applications on Android . Proceedings of the Second ACM Conference on Data and Application Security and Privacy , San Antonio,USA , 2012 : 317 ~ 326
Zheng M . DroidAnalytics: a signature based analytic system to collect, extract, analyze and associate Android malware . http://arxiv.org/abs/1302.7212 http://arxiv.org/abs/1302.7212 , 2013
Elish K O . A static assurance analysis of Android applications . http://people.cs.vt.edu/~danfeng/papers/user-intention-PA-2013. pdf http://people.cs.vt.edu/~danfeng/papers/user-intention-PA-2013. pdf , 2013
Grace M . RiskRanker: scalable and accurate zero-day Android malware detection . Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services , Paphos, Cyprus , 2012 : 281 ~ 294
Enck W , Octeau D , McDaniel P , et al . A study of Android application security . Proceedings of the 20th USENIX Security Symposium, USENIX Security'11 , San Francisco, CA , 2011
Zhao M . RobotDroid: a lightweight malware detection framework on smartphones . Journal of Networks , 2012 , 7 ( 4 ): 715 ~ 722
Zhao M . A smartphone malware detection framework based on artificial immunology . Journal of Networks , 2013 , 8 ( 2 ): 469 ~ 476
Shabtai A . Andromaly: a behavioral malware detection framework for android devices . Journal of Intelligent Information Systems , 2012 , 38 ( 1 ): 161 ~ 190
Aung Z . Permission-based Android malware detection . National Journal of Science & Technology Research , 2013 , 2 ( 3 )
Burguera I . An Android application sandbox system for suspicious software detection . Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices , Berlin, Germany , 2011 : 15 ~ 26
Iland D . Detecting Android malware on network level . http://www.ijcset.com/docs/IJCSET13-04-04-094.pdf http://www.ijcset.com/docs/IJCSET13-04-04-094.pdf , 2011
Park Y . An Android security extension to protect personal information against illegal accesses and privilege escalation attacks . Journal of Internet Services and Information Security (JISIS) , 2012 , 2 ( 3/4 ): 29 ~ 42
Beginners guide to Android reverse engineering . http://events.ccc.de/congress/2012/wiki/Beginners_Guide_to_Android_Reverse_Engineering http://events.ccc.de/congress/2012/wiki/Beginners_Guide_to_Android_Reverse_Engineering , 2012
Zhou Y , Wang Z , Zhou W , et al . Hey, you, get off my market:detecting malicious apps in alternative Android markets . Proceedings of the 16th Network and Distributed System Security Symposium, NDSS'12 , San Diego, California , 2012
Su X . Smartphone dual defense protection framework: detecting malicious applications in Android markets . Proceedings of 8th International Conference on Mobile Ad Hoc and Sensor Networks , Chengdu, China , 2012
粟栗 , 从健 , 赵乐意 . 涉黄域名二次中标问题研究 . 电信工程技术与标准化 , 2011 ( 10 ): 11 ~ 14 .
0
浏览量
512
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构