Font Size: a A A

Study On Android Mobile Phone Trojan Detection Based-on Behavior Analysis

Posted on:2013-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:D T TongFull Text:PDF
GTID:2248330362463657Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The popularity of mobile internet technology and the intelligent mobile phonetechnology bring much convenience into people’s work and life. However, the rapidspread of mobile phone viruses is causing a wide range of harms on mobile phoneusers. Most of today’s mobile phone virus is mobile phone Trojan,which implementmalicious acts such as stealing private information of users, maliciously orderingbusiness by receiving command from remote service. Because of its highly opensource and weak signature mechanism, Android platform is becoming the main targetfor mobile phone Trojan. Therefore, to study mobile phone Trojan prevention ofAndroid platform, can effectively inhibit the harm of current mobile phone Trojan,which has great practical value.This paper adopted the technology of behavior detection to propose an Androidmobile phone Trojan detection method. This method first detailed studied thebehavioral characteristics of today’s Android mobile phone Trojan, and analysis themanifestation of these characteristics in Android platform log records, then by thedifference compared with the normal behavior of the normal mobile applications,formed a mobile phone Trojan behavior detection rules. Finally we proposed andimplemented a mobile phone Trojan detection system based on analysis logs fromAndroid platform, results from experiment showed that the proposed method iseffective.This paper presents an innovative Android mobile phone Trojan detectionmethod,which can not only detects mobile phone Trojan, but also analyzes thespecific behavior of the Trojans. In addition, this method maps mobile phone Trojanbehavioral characteristics into manifestation of system logs, detects mobile phoneTrojan by analyzing system logs, so the monitoring points are less, detection rules aremore simple. The detection method proposed in this paper has strong capability todetect stealing private information and maliciously ordering business, which caneffectively protect information security and property safety of consumers.
Keywords/Search Tags:Mobile phone Trojan, Behavioral detection, Android, Security
PDF Full Text Request
Related items