信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 28-33.doi: 10.3969/j.issn.1671-1122.2014.08.005
• Orginal Article • Previous Articles Next Articles
REN Wei, LIU Kun, ZHOU Jin
Received:
2014-06-14
Online:
2014-08-01
CLC Number:
REN Wei, LIU Kun, ZHOU Jin. AnDa: a Dynamic Analysis System for Malicious Code[J]. 信息网络安全, 2014, 14(8): 28-33.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.08.005
[1] CNCERT/CC. CNCERT/CC 2013 年上半年网络安全工作报告[R]. 2014. [2] YU Peng-yang,HUANG Jun-fei,GONG Yun-zhan. Static Code Analysis of Adroid Applications Information Leakage[J]. Computer engineering & soft ware,2012,33(10):125-129. [3] GUI Jia-ping, ZHOU Yong-kai, SHEN Jun, et al. Research on Prevention Model of Malicious Coding Smart Phone [J].Computer Technology and Development,2010,(10):169-172. [4] YANG Chang-gang. Deeply analyze the Android system[M]. Beijing: Publishing House of Electronics industry, 2013. [5] JIN Tai-yan, SONG Heng-zhou, PIAO Zhi-xun,et al. Inside the Android Framework[M]. WU Chuan-hai. Beijing: Posts &Telecom Press, 2012. [6] Han Chao. Android core principles and efficient development of system-level applications[M]. Beijing: Electronic Industry Press, 2012. [7] Zhang Shan-xiang. Parsing java virtual machine development[M]. Beijing:Tsinghua University Press, 2013. [8] Lu Cheng, Zhnag Miao, Xu Ai-guo. Android application source code for malicious behavior detection model based on static analysis techniques[J]. Chinese scientific papers online, 201111-54. [9] Xposed Module Repository [EB/OL]. http://repo.xposed.info/,2014-06-14. [10] Rovo89, Tungstwenty. Xposed [EB/OL]. https://github.com/rovo89,2014-06-14. [11] The Introduction of Xposed [EB/OL]. http://forum.xda-developers.com/showthread.php? t=1574 401, 2014-06-14. [12] Luo Sheng-yang. Android system source code Scenario Analysis[M]. Beijing: Publishing House of Electronics Industry, 2012. [13] Ke Yuan-dan. The profiling of Android kernel[M]. Publishing House of Electronics industry, 2011. [14] Li-Gang. Crazy handouts of Android[M]. Publishing House of Electronics industry, 2013. [15] The Items of Xposed [EB/OL]. http://github.com/rovo89,2014-06-14. [16] Li Bin. Design and implementation of a software-based behavioral analysis system Android sandbox[D]. Beijing: Beijing University of Postand Telecommunication,2013. [17] Gan Tian. Android mobile phone software testing methods and practice[D]. Beijing: Beijing University of Postand Telecomm unication,2011. |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||