Journal of Xidian University ›› 2019, Vol. 46 ›› Issue (3): 45-51.doi: 10.19665/j.issn1001-2400.2019.03.008
Previous Articles Next Articles
YANG Hongyu,NA Yuzhuo
Received:
2018-09-19
Online:
2019-06-20
Published:
2019-06-19
CLC Number:
YANG Hongyu,NA Yuzhuo. Android malware detection model[J].Journal of Xidian University, 2019, 46(3): 45-51.
"
指令功能 | 数量 | 操作码前缀 | 指令功能 | 数量 | 操作码前缀 |
---|---|---|---|---|---|
数据定义 | 11 | const const-wide const-string const-class | 方法调用 | 10 | invoke-virtual invoke-super invoke-direct |
数据操作 | 13 | move move-object move-wide move-result | 方法返回 | 4 | return-void return return-wide return-object |
对象操作 | 3 | check-cast instance-of new-instance | 同步 | 2 | monitor-enter monitor-exit |
数组操作 | 5 | array-length new-array filled-new-array | 异常 | 1 | throw |
数据运算 | 83 | add sub mul div rem and or xor shl shr ushr | 数据转换 | 21 | int-to-long float-to-int int-to-byte not-int |
比较 | 5 | cmp-long cmpl-float cmpg-float cmpl-double cmpg-double | 跳转 | 17 | goto packed-switch sparse-switch if-eq if-ne if-eqz if-nez |
字段读写 | 42 | iget iput aget aput sget sput | 空指令 | 1 | nop |
[1] | 卿斯汉 . Android安全研究进展[J]. 软件学报, 2016,27(1):45-71. |
QING Sihan , Research Progress on Android Security[J]. Journal of Software, 2016,27(1):45-71. | |
[2] |
FEIZOLLAH A, ANUAR N B, SALLEH R , et al. AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection[J]. Computers and Security, 2017,65(C):121-134.
doi: 10.1016/j.cose.2016.11.007 |
[3] | RASHIDI B, FUNG C, BERTINO E . Android Malicious Application Detection Using Support Vector Machine and Active Learning [C]//Proceedings of the 2017 13th International Conference on Network and Service Management. Piscataway: IEEE, 2018: 1-9. |
[4] |
YERIMA S Y, SEZER S . DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection[J]. IEEE Transactions on Cybernetics, 2019,49(2):453-466.
doi: 10.1109/TCYB.2017.2777960 |
[5] |
TAO G, ZHENG Z, GUO Z , et al. MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-related APIs[J]. IEEE Transactions on Reliability, 2018,67(1):355-369.
doi: 10.1109/TR.2017.2778147 |
[6] | 邵舒迪, 虞慧群, 范贵生 . 基于权限和API特征结合的Android恶意软件检测方法[J]. 计算机科学, 2017,44(4):135-139. |
SHAO Shudi, YU Huiqun, FAN Guisheng . Detecting Malware by Combining API and Permission Features[J]. Computer Science, 2017,44(4):135-139. | |
[7] | 谢丽霞, 李爽 . 基于Bagging-SVM的Android恶意软件检测模型[J]. 计算机应用, 2018,38(3):818-823. |
XIE Lixia, LI Shuang . Android Malware Detection Model Based on Bagging-SVM[J]. Journal of Computer Applications, 2018,38(3):818-823. | |
[8] | 杨宏宇, 徐晋 . 基于改进随机森林算法的Android恶意软件检测[J]. 通信学报, 2017,38(4):8-16. |
YANG Hongyu, XU Jin . Android Malware Detection Based on Improved Random Forest[J]. Journal on Communications, 2017,38(4):8-16. | |
[9] |
陈铁明, 杨益敏, 陈波 . Maldetect:基于Dalvik指令抽象的Android恶意代码检测系统[J]. 计算机研究与发展, 2016,53(10):2299-2306.
doi: 10.7544/issn1000-1239.2016.20160348 |
CHEN Tieming, YANG Yimin, CHEN Bo . Maldetect: an Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016,53(10):2299-2306.
doi: 10.7544/issn1000-1239.2016.20160348 |
|
[10] | 苏志达, 祝跃飞, 刘龙 . 基于深度学习的安卓恶意应用检测[J]. 计算机应用, 2017,37(6):1650-1656. |
SU Zhida, ZHU Yuefei, LIU Long . Android Malware Application Detection Using Deep Learning[J]. Journal of Computer Applications, 2017,37(6):1650-1656. | |
[11] | GITHUB . Apktool: a Tool for Reverse Engineering Android apk Files [EB/OL].[2018-07-07]. https://ibotpeaches.github.io/Apktool |
[12] | PALLER G . Dalvik Opcodes [EB/OL]. [ 2018- 07- 07]. http://pallergabor. uw.hu.androidblog/dalvik_opcodes.html |
[13] | Virus Total [EB/OL]. [2018-07-07]. https://www.virustotal.com/#/home/upload |
[14] | ZHOU Y, JIANG X . Dissecting Android Malware: Characterization and Evolution [C]// Proceedings of the IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2012: 95-109. |
[15] | TensorFlow [EB/OL]. [2018-07-07]. https://www.tensorflow.org |
[1] | YU Haoyang,YIN Liang,LI Shufang,LV Shun. Recognition algorithm for the little sample radar modulation signal based on the generative adversarial network [J]. Journal of Xidian University, 2021, 48(6): 96-104. |
[2] | SUN Yanjing,WEI Li,ZHANG Nianlong,YUN Xiao,DONG Kaiwen,GE Min,CHENG Xiaozhou,HOU Xiaofeng. Person re-identification method combining the DD-GAN and Global feature in a coal mine [J]. Journal of Xidian University, 2021, 48(5): 201-211. |
[3] | ZHOU Peng,YANG Jun. Semantic segmentation of remote sensing images based on neural architecture search [J]. Journal of Xidian University, 2021, 48(5): 47-57. |
[4] | YANG Yunhang,MIN Lianquan. Multi-scalefusion sketch recognition model by dilated convolution [J]. Journal of Xidian University, 2021, 48(5): 92-99. |
[5] | CHEN Changchuan,WANG Haining,HUANG Lian,HUANG Tao,LI Lianjie,HUANG Xiangkang,DAI Shaosheng. Facial expression recognition based on local representation [J]. Journal of Xidian University, 2021, 48(5): 100-109. |
[6] | SONG Jianfeng,MIAO Qiguang,WANG Chongxiao,XU Hao,YANG Jin. Multi-scale single object tracking based on the attention mechanism [J]. Journal of Xidian University, 2021, 48(5): 110-116. |
[7] | ZHANG Yuhao,CHENG Peitao,ZHANG Shuhao,WANG Xiumei. Lightweight image super-resolution with the adaptive weight learning network [J]. Journal of Xidian University, 2021, 48(5): 15-22. |
[8] | HUI Haisheng,ZHANG Xueying,WU Zelin,LI Fenglian. Method for stroke lesion segmentation using the primary-auxiliary path attention compensation network [J]. Journal of Xidian University, 2021, 48(4): 200-208. |
[9] | WANG Ping,JIANG Yuze,ZHAO Guanghui. Object detection based on the multiscale location Enhancement network [J]. Journal of Xidian University, 2021, 48(3): 85-90. |
[10] | GUO Zekun,TIAN Long,HAN Ning,WANG Penghui,LIU Hongwei,CHEN Bo. Radar HRRP based few-shot target recognition with CNN-SSD [J]. Journal of Xidian University, 2021, 48(2): 7-14. |
[11] | CHENG Lei,WANG Yue,TIAN Chunna. Residual attention mechanism for visual tracking [J]. Journal of Xidian University, 2020, 47(6): 148-157. |
[12] | KONG Xin,CHEN Gang,GONG Guoliang,LU Huaxiang,Mao Wenyu. High performance multiply-accumulator for the convolutional neural networks accelerator [J]. Journal of Xidian University, 2020, 47(4): 55-63. |
[13] | DANG Jisheng,YANG Jun. 3D model recognition and segmentation based on multi-feature fusion [J]. Journal of Xidian University, 2020, 47(4): 149-157. |
[14] | LI Kunlun,ZHANG Lu,XU Hongke,SONG Huansheng. Waveletdomain dilated network for fast low-dose CT image reconstruction [J]. Journal of Xidian University, 2020, 47(4): 86-93. |
[15] | CUI Yanpeng,WANG Yuanhao,HU Jianwei. Detection method for a dynamic small target using the improved YOLOv3 [J]. Journal of Xidian University, 2020, 47(3): 1-7. |
|