English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 47249/51115 (92%)
造訪人次 : 14281223      線上人數 : 687
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/38198


    題名: 以結構內容相似度為基礎之Android惡意軟體偵測
    Android Malware Detection Based on Structural Content Similarity
    作者: 簡毅
    貢獻者: 資訊管理學系
    關鍵詞: 靜態分析
    逆向工程
    Android
    static analysis
    reverse engineering
    日期: 2017
    上傳時間: 2017-09-27 11:00:55 (UTC+8)
    摘要: 近年來智慧型手機已經成為市場上的主流,日常生活中有越來越多擁有強大運算能力和可以儲存大量資料的行動裝置,也因此讓較私密的資料,像是個人資料、帳號密碼甚至是金融資料等,都有可能成為被盜取濫用的資訊。隨著運算能力的提升與行動通訊技術的進步,行動裝置變得更普及化、上網人口的比率也在逐漸增加。因此,行動裝置也出現以往個人電腦所面臨的威脅,像是木馬程式的攻擊、資料的盜取、阻斷式攻擊與勒索攻擊等。
    手機惡意軟體推陳出新的速度非常快,每天都會有新的版本和變種出現,有鑑於此本研究認為惡意程式從出現到被發現、擷取與完成特徵碼分析之間的空窗期是必須被縮短的,所以本研究首先利用逆向工程技術還原原始碼,再利用原始碼裡的class-method-API製作結構圖,再利用MI選出惡意程式常用的API,最後透過比對上述結構圖包含敏感API的部分來判斷是否為惡意程式。
    In recent years, smartphones have become the mainstream of the market, everyday there are more and more computing power and has a strong mobile device can store large amounts of data, and therefore allow a more private data, such as personal information, account passwords and even Financial information, etc., are likely to be stolen abuse of information. With the improvement of computing power and the progress of mobile communication technology, mobile devices become more popular, the proportion of In-ternet population is gradually increasing. Therefore, mobile devices are also emerging threats in the past PC facing attacks like Trojans, steal data, blocking attacks and extortion attacks.
    Mobile malware is very fast, and new versions and variants appear every day. In view of the fact that this study suggests that the malicious program is discovered from the occurrence to the discovery, the window period between the capture and the completion of the signature analysis must be shortened , it was first developed to reverse engineering technology source reduction, reuse of the source code in the class-meth od-API composi-tion for making a junction, MI selected malicious reuse common API, and finally through the above-described configuration than FIG comprising the sensitive API part to deter-mine whether the malware.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML236檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋