文献知网节
  • 记笔记
摘要:Android, the quickest-growing OS for smartphones, taking the market by storm, has a unique position in the market. But it also surpassed Symbian in the amount of new malware and becomes the top malware targeted platform. This paper attempts to analysis the current Android security model and work out a new scheme for better protection against reverse engineering. And it suggests to use JNI to access arbitrary memory locations which is impossible by using Dalvik bytecode. Besides, obfuscation of the .dex file and packing the .so file can safeguard the applications against virus injection to a large extent .
会议名称:

2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems

会议时间:

2012-10-30

会议地点:

中国浙江杭州

  • 专辑:

    信息科技

  • 专题:

    电信技术; 计算机软件及计算机应用

  • 分类号:

    TN929.5;TP309

  • 手机阅读
    即刻使用手机阅读
    第一步

    扫描二维码下载

    "移动知网-全球学术快报"客户端

    第二步

    打开“全球学术快报”

    点击首页左上角的扫描图标

    第三步

    扫描二维码

    手机同步阅读本篇文献

  • CAJ下载
  • PDF下载

下载手机APP用APP扫此码同步阅读该篇文章

下载:53 页码:951-955 页数:5 大小:493k

引文网络
  • 参考文献
  • 引证文献
  • 共引文献
  • 同被引文献
  • 二级参考文献
  • 二级引证文献
  • 批量下载
相关推荐
  • 相似文献
  • 读者推荐
  • 相关基金文献
  • 相关法规
  • 关联作者
  • 相关视频