{"title":"Android木马关键技术案例研究","authors":"Zhi-Yu Liu, Yi-Chao Li, Hua-Cong Yang, Jie Qiu","doi":"10.1109/ICCWAMTIP.2014.7073418","DOIUrl":null,"url":null,"abstract":"With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring, confrontation with cracking, and then, designed a prototype of Trojan for evaluation. This work eventually should be able to provide a reference for the design of security mechanisms.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A case study on key technologies of Android Trojans\",\"authors\":\"Zhi-Yu Liu, Yi-Chao Li, Hua-Cong Yang, Jie Qiu\",\"doi\":\"10.1109/ICCWAMTIP.2014.7073418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring, confrontation with cracking, and then, designed a prototype of Trojan for evaluation. This work eventually should be able to provide a reference for the design of security mechanisms.\",\"PeriodicalId\":211273,\"journal\":{\"name\":\"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCWAMTIP.2014.7073418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCWAMTIP.2014.7073418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A case study on key technologies of Android Trojans
With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring, confrontation with cracking, and then, designed a prototype of Trojan for evaluation. This work eventually should be able to provide a reference for the design of security mechanisms.