Affiliation:
1. Guangdong University of Technology
Abstract
Due to the android platform is open source, more and more developers and manufacturers to use it. At the same time its security attracts more and more challenges, it is vulnerable to mobile phone virus attacks. In order to solve these problems, we should detect the files in the phone. Because the Boyer-Moore algorithms efficiency is higher than others, so we use it in android application intrusion detection. First we should set up a virus signature library, and store these signatures in the SQLite Database. Then scanning system of documents carries on the analysis and extraction corresponding feature codes, and use the BM algorithm to match them with virus signature, and we can find the viruses. What is new and original in this paper is that the efficiency of intrusion detection is higher.
Publisher
Trans Tech Publications, Ltd.
Reference8 articles.
1. Bangui, H., Alam, M., Khan, S. ET al. An Android runtime security policy enforcement framework [J]. Personal and ubiquitous computing, 2012, 16(6): 631-641.
2. Informationon http: /www. netqin. com/security/securityinfo. jsp?id=4407.
3. Information on http: /www. source. android. com/tech/security.
4. Enck W, OngTang M, and Mc Daniel P . Understanding Android Security [J] IEEE Security and Privacy , 2009. 7: 50-57.
5. Xi gong Wu, Jie Ling. BM pattern matching algorithm analysis [J]. Computer engineering and design 28th January 2007 (1). 29-31 In Chinese.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献