西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)03 Android应用安全 Android application security

Android application security
Android application security

As the most popular mobile OS,android platform is a growing target for security attacks from many sources
• As the most popular mobile OS, android platform is a growing target for security attacks from many sources

。Untrusted developer -the prevalence of installed applications coming from unknown developers 。Open app markets raising concerns about how risky third-party applications are and how they may misuse or improperly handle users'privacy-sensitive data
• Untrusted developer – the prevalence of installed applications coming from unknown developers • Open app markets – raising concerns about how risky third-party applications are and how they may misuse or improperly handle users’ privacy-sensitive data

。Mobile users know the security risk when a downloaded app is installed on their phones monitor the run-time operations during the apps are running ·Trusted Developer make secure enough apps,such as internet banking apps no vulnerability could be exploited by attackers to bring serious damage
• Mobile users – know the security risk when a downloaded app is installed on their phones – monitor the run-time operations during the apps are running • Trusted Developer – make secure enough apps, such as internet banking apps – no vulnerability could be exploited by attackers to bring serious damage

security validation for android apps ensure that the new app conforms to the security requirements a platform is built for app markets and developers to perform security verification and validation of these massive apps automatically evaluate the security of apps
security validation for android apps • ensure that the new app conforms to the security requirements • a platform is built for app markets and developers to perform security verification and validation of these massive apps – automatically evaluate the security of apps

Effective tracking mechanism for run-time properties:control-flow and data-flow Patterns of security violation,pattern expression and matching Vulnerability Scanning Applicable for three categories of apps:web, native and hybrid Practical consideration,such as performance, accuracy,.… So-called best practices
• Effective tracking mechanism for run-time properties: control-flow and data-flow • Patterns of security violation, pattern expression and matching • Vulnerability Scanning • Applicable for three categories of apps: web, native and hybrid • Practical consideration, such as performance, accuracy, … • So-called best practices

Malware,softwares that exhibits malicious behavior, -virus,worm,Trojan horse
• Malware, softwaresthat exhibits malicious behavior, – virus, worm, Trojan horse

We need to develop methods to automate the malware analysis process 。Signature-based Specific patterns in the bytecode and API calls Machine learning-based Features from an application's behavior Machine learning algorithms
• We need to develop methods to automate the malware analysis process • Signature-based – Specific patterns in the bytecode and API calls • Machine learning-based – Features from an application’s behavior – Machine learning algorithms

Malicious Behavior Table 1.Behavioral classification overview for mobile malware in the wild. Malware Description behavior Primarily developed for fun or to show off the author's technical expertise, Offers novelty and less serious,generates purposeless amusement destruction.Example:Android Walkinwat Secretly collects user details.such as location,installed applications. Sells user download history.and contact lists:these information details are then sold to advertisers and marketers.Example: DroidDreamLight: Captures user credentials,such as bank account details.by secretly Steals user snooping on text messages.capturing keystrokes credentials by key logging,scanning documents.and launching phishing attacks Example:Ikee B: Manipulates Generates premium-rate phone calls and sends text messages.perhaps to deliver content such as technical content delivery support,stock quotes.or adult services.Example:FakePlayer, Spams multiple messages to mobile phones that usually contain Sends SMS spam advertisements and phishing links.Example Geinimi: Manipulates search Improves website rankings in search engine results.Example:Hong Tou engine optimization
Malicious Behavior

Static analysis finding malicious characteristics or bad code segments in an application without executing them Preliminary analysis,obvious security threats
Static analysis • finding malicious characteristics or bad code segments in an application without executing them • Preliminary analysis, obvious security threats
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)03 移动互联网技术(Android安全).ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)02 移动互联网概述.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)01 课程介绍(主讲:苏锐丹).ppt
- 《移动互联网技术》课程教学资源(培训教材)Cisco Press - Building the Mobile Internet(Mark Grayson, Kevin Shatzkamer, Klaas Wierenga).pdf
- 西安电子科技大学:《操作系统》课程教学资源(PPT课件)Processes.pptx
- 西安电子科技大学:《操作系统》课程教学资源(PPT课件)Operating-System Structure.pptx
- 西安电子科技大学:《操作系统》课程教学资源(PPT课件)Introduction(主讲:苏锐丹).pptx
- 《C++ 语言程序设计》课程教学资源(应用阅读)ASCII 码——常用ASCII码.pdf
- 《C++ 语言程序设计》课程教学资源(应用阅读)ASCII码(256完整版)The ASCII Character Set.pdf
- 《C++ 语言程序设计》课程教学资源(应用阅读)C++ RC by Mississippi State U.(2009).pdf
- 《C++ 语言程序设计》课程教学资源(应用阅读)C++ Reference Card(C++ RC by Greg Book,2002).pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十六讲 标准模板库(Standard Template Library,STL).pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十五讲 文件流与输出输入重载.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十四讲 多态.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十三讲 继承与派生.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十二讲 运算符重载与自动类型转换.pdf
- 《C++ 语言程序设计》课程教学资源(应用阅读)C++ vector使用方法.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十一讲 类与对象(III)面向对象提高.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第十讲 类与对象(II)面向对象进阶.pdf
- 华东师范大学:《C++ 语言程序设计》课程教学资源(课件讲稿)第九讲 类与对象(I)面向对象基础.pdf
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)03 传输层移动性.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)03 应用层移动性.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)03 相关支撑技术.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)04 数据链路层移动性技术.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)05 网络层Mobility.ppt
- 西安电子科技大学:《移动互联网技术》课程教学资源(PPT课件)06 移动互联网IPv6.ppt
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(教案讲义,打印版)实验教学大纲.pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(教案讲义,打印版)理论教学大纲.pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第1章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第2章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第3章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第4章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第5章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第8章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第10章(作业,打印版).pdf
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第1章(答案).doc
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第2章(答案).doc
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第6章 定时器、计数器(作业).doc
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第7章 串行口(作业).doc
- 兰州交通大学:《单片机原理与接口技术》课程教学资源(课后作业)第3章(答案).doc