• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

脑机接口中用于数据安全的 Android 应用程序的信息丰富且全面的行为特征分析方法。

An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.

机构信息

Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha, China.

Big Data Intelligence Police Hunan Provincial Engineering Research Center, Hunan Police Academy, Changsha, China.

出版信息

Comput Math Methods Med. 2020 Mar 10;2020:3658795. doi: 10.1155/2020/3658795. eCollection 2020.

DOI:10.1155/2020/3658795
PMID:32300372
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7085869/
Abstract

Recently, brain-machine interfacing is very popular that link humans and artificial devices through brain signals which lead to corresponding mobile application as supplementary. The Android platform has developed rapidly because of its good user experience and openness. Meanwhile, these characteristics of this platform, which cause the amazing pace of Android malware, pose a great threat to this platform and data correction during signal transmission of brain-machine interfacing. Many previous works employ various behavioral characteristics to analyze Android application (or app) and detect Android malware to protect signal data secure. However, with the development of Android app, category of Android app tends to be diverse, and the Android malware behavior tends to be complex. This situation makes existing Android malware detections complicated and inefficient. In this paper, we propose a broad analysis, gathering as many behavior characteristics of an app as possible and compare these behavior characteristics in several metrics. First, we extract static and dynamic behavioral characteristic from Android app in an automatic manner. Second, we explain the decision we made in each kind of behavioral characteristic we choose for Android app analysis and Android malware detection. Third, we design a detailed experiment, which compare the efficiency of each kind of behavior characteristic in different aspects. The results of experiment also show Android malware detection performance of these behavior characteristics combine with well-known machine learning algorithms.

摘要

最近,脑机接口非常流行,它通过脑信号将人类和人工智能设备连接起来,从而实现相应的移动应用作为补充。Android 平台因其良好的用户体验和开放性而迅速发展。然而,这个平台的这些特点导致了 Android 恶意软件惊人的发展速度,对这个平台和脑机接口信号传输过程中的数据修正构成了巨大威胁。许多先前的工作采用各种行为特征来分析 Android 应用程序(或 app)并检测 Android 恶意软件,以保护信号数据的安全。然而,随着 Android 应用程序的发展,Android 应用程序的类别趋于多样化,而 Android 恶意软件的行为也趋于复杂。这种情况使得现有的 Android 恶意软件检测变得复杂和低效。在本文中,我们提出了一种广泛的分析方法,尽可能多地收集应用程序的行为特征,并在几个指标上比较这些行为特征。首先,我们以自动的方式从 Android 应用程序中提取静态和动态行为特征。其次,我们解释了在为 Android 应用程序分析和 Android 恶意软件检测选择各种行为特征时所做的决策。第三,我们设计了一个详细的实验,比较了在不同方面每种行为特征的效率。实验结果还表明,这些行为特征与著名的机器学习算法相结合,具有较好的 Android 恶意软件检测性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/547b0e83c6aa/CMMM2020-3658795.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/92c26702a074/CMMM2020-3658795.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/41edb661335c/CMMM2020-3658795.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/add6ca285e61/CMMM2020-3658795.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/e181442f89a8/CMMM2020-3658795.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/82d8bce73a87/CMMM2020-3658795.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/2f7063180a33/CMMM2020-3658795.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/f372340d3ac0/CMMM2020-3658795.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/3da372c7f867/CMMM2020-3658795.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/28912338f80f/CMMM2020-3658795.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/ceb75489594c/CMMM2020-3658795.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/ef1a8486140d/CMMM2020-3658795.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/1e81db9ce887/CMMM2020-3658795.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/547b0e83c6aa/CMMM2020-3658795.alg.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/92c26702a074/CMMM2020-3658795.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/41edb661335c/CMMM2020-3658795.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/add6ca285e61/CMMM2020-3658795.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/e181442f89a8/CMMM2020-3658795.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/82d8bce73a87/CMMM2020-3658795.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/2f7063180a33/CMMM2020-3658795.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/f372340d3ac0/CMMM2020-3658795.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/3da372c7f867/CMMM2020-3658795.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/28912338f80f/CMMM2020-3658795.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/ceb75489594c/CMMM2020-3658795.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/ef1a8486140d/CMMM2020-3658795.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/1e81db9ce887/CMMM2020-3658795.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3989/7085869/547b0e83c6aa/CMMM2020-3658795.alg.001.jpg

相似文献

1
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.脑机接口中用于数据安全的 Android 应用程序的信息丰富且全面的行为特征分析方法。
Comput Math Methods Med. 2020 Mar 10;2020:3658795. doi: 10.1155/2020/3658795. eCollection 2020.
2
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.
3
A static analysis approach for Android permission-based malware detection systems.基于静态分析的 Android 权限型恶意软件检测系统。
PLoS One. 2021 Sep 30;16(9):e0257968. doi: 10.1371/journal.pone.0257968. eCollection 2021.
4
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.人工智能算法在安卓操作系统移动设备中的恶意软件检测。
Sensors (Basel). 2022 Mar 15;22(6):2268. doi: 10.3390/s22062268.
5
MFDroid: A Stacking Ensemble Learning Framework for Android Malware Detection.MFDroid:一种用于 Android 恶意软件检测的堆叠集成学习框架。
Sensors (Basel). 2022 Mar 28;22(7):2597. doi: 10.3390/s22072597.
6
Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning.基于 Koodous 平台和机器学习的轻量级 Android 恶意软件设备端检测。
Sensors (Basel). 2022 Aug 31;22(17):6562. doi: 10.3390/s22176562.
7
Automated Android Malware Detection Using User Feedback.利用用户反馈实现自动化的安卓恶意软件检测
Sensors (Basel). 2022 Aug 31;22(17):6561. doi: 10.3390/s22176561.
8
Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review.基于安卓平台应用权限分析的恶意软件检测:系统文献综述。
Sensors (Basel). 2022 Oct 18;22(20):7928. doi: 10.3390/s22207928.
9
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.基于 OpCode 级函数调用图的深度学习的安卓恶意软件分类。
Sensors (Basel). 2020 Jun 29;20(13):3645. doi: 10.3390/s20133645.
10
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.