한국해양대학교

Detailed Information

Metadata Downloads

정적 분석을 통한 안드로이드 기반 스마트폰의 악성코드 탐지 기법

DC Field Value Language
dc.contributor.author 윤진식 -
dc.date.accessioned 2017-02-22T06:59:25Z -
dc.date.available 2017-02-22T06:59:25Z -
dc.date.issued 2011 -
dc.date.submitted 56959-08-17 -
dc.identifier.uri http://kmou.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000002175799 ko_KR
dc.identifier.uri http://repository.kmou.ac.kr/handle/2014.oak/10110 -
dc.description.abstract As Google's Android shows the fastest growing mobile smartphone operating system in the world, also some vulnerability issues in Android browser which could allow an attacker to remotely steal the user's local data or to make spoof applications that could silently download a mobile malware application in the background have been increasing today. Due to the increase, many Android applications which may contain mobile malware recently started to show up on the Android Market(Google's app store for Android). Most mobile antivirus applications are for Windows Mobile and Symbian devices so far -
dc.description.abstract However with the increase of threats also for Android, many mobile antivirus companies are trying to treat this OS in their product. Nevertheless a lot of security issues in mobile circumstance arise continuously. The important thing is that both neither Google nor Microsoft handle and approve, in fact, apps the same way for example Apple does. The motivation for this thesis was to extract and detect an Android malware efficiently and more quickly. The static analysis is used to achieve this. Further, the signature detection technique with a few heuristic techniques shows the brilliant results. In particular, the proposed solution extracts a header of malware and a operation data with so called static analysis. Then, 'SHA-1 signature' and 'API Call Combination signature' are extracted - each function separately identifies a specific application and detects the specific factors that affect to the operation system directly. Finally the proposed solution senses a mobile malware application quickly and correctly with these signatures and heuristic techniques which are able to detect a new and mutant efficiently, whereas other previous antivirus applications show good performance but there are some fatal flaws to detect them. Futhermore the static analysis permits a prompt detection before an execution. -
dc.description.tableofcontents 제 1 장 서 론 제 2 장 관련 연구 2.1 안드로이드 구조 및 보안 모델 2.1.1 안드로이드 플랫폼 2.1.2 안드로이드 보안 모델 2.2 악성코드 분석 및 탐지 기법 2.2.1 악성코드 정의 및 특징 2.2.2 악성코드 분석 기법 2.2.3 파일 기반 악성코드 탐지 기법 제 3 장 MDA(Malware Detection for Android) 시스템 설계 및 구현 3.1 MDA 시스템 구조 3.2 dex 분석기 3.2.1 dex 추출기 3.2.2 dex 파서 3.3 악성코드 탐지 엔진 3.3.1 시그니쳐 탐지기 3.3.2 휴리스틱 탐지기 제 4 장 MDA 시스템 실험 4.1 dex 분석기 실험 4.1.1 dex 추출 4.1.2 dex 파싱 4.2 악성코드 탐지 엔진 실험 4.2.1 SHA-1 시그니쳐 탐지 4.2.2 휴리스틱 탐지 4.2.3 허용 어플리케이션 시그니쳐 추가 제 5 장 결론 및 향후 과제 참고 문헌 -
dc.language kor -
dc.publisher 한국해양대학교 대학원 -
dc.title 정적 분석을 통한 안드로이드 기반 스마트폰의 악성코드 탐지 기법 -
dc.title.alternative Malware Detection Technique of Android-based Smartphone using Static Analysis -
dc.type Thesis -
dc.date.awarded 2011-02 -
dc.contributor.alternativeName Jin-sik Yun -
Appears in Collections:
컴퓨터공학과 > Thesis
Files in This Item:
000002175799.pdf Download

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse