• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen. A Behavior-Based System Resources Access Control Scheme for Android[J]. Journal of Computer Research and Development, 2014, 51(5): 1028-1038.
Citation: Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen. A Behavior-Based System Resources Access Control Scheme for Android[J]. Journal of Computer Research and Development, 2014, 51(5): 1028-1038.

A Behavior-Based System Resources Access Control Scheme for Android

More Information
  • Published Date: May 14, 2014
  • As a coarse-grained access control mechanism, Android permission model cannot effectively prevent the applications from abusing system resources to launch attacks. In this paper, a behavior-based system resources access control scheme is proposed, to regulate the applications’ behavior in their system resources accessing and prevent the resources from being abused by applications. Firstly, we define a secure behavior pattern for each security-related critical system resource access operation using temporal logic of causal knowledge (TLCK) logic, and dynamically monitor the behavior of the applications. Then, the access control to these system resources is implemented through comparing the applications’ dynamic behavior with the resources’ secure behavior patterns. Compared with the malicious code detection schemes based on malicious behavior signatures, secure behavior patterns are easier to be defined and can be used to detect unknown attacks. Finally, we achieve a behavior-based resources access control system for short message service (SMS) attacks, the most preferred attacks for Android. And the experimental results demonstrate that this scheme has good performance in terms of effectiveness and efficiency.
  • Related Articles

    [1]Xu Dongzhu, Zhou Anfu, Ma Huadong, Zhang Yuan. Continuous Learning-Based Task Demand Understanding and Scheduling Method for Video Internet of Things[J]. Journal of Computer Research and Development, 2024, 61(11): 2793-2805. DOI: 10.7544/issn1000-1239.202440403
    [2]Fu Maozhong, Hu Haiyang, Li Zhongjin. Dynamic Resource Scheduling Method for GPU Cluster[J]. Journal of Computer Research and Development, 2023, 60(6): 1308-1321. DOI: 10.7544/issn1000-1239.202220149
    [3]Li Xiaoping, Zhou Zhixing, Chen Long, Zhu Jie. Task Offloading and Cooperative Scheduling for Heterogeneous Edge Resources[J]. Journal of Computer Research and Development, 2023, 60(6): 1296-1307. DOI: 10.7544/issn1000-1239.202110936
    [4]Su Mingfeng, Wang Guojun, Li Renfa. Resource Deployment with Prediction and Task Scheduling Optimization in Edge Cloud Collaborative Computing[J]. Journal of Computer Research and Development, 2021, 58(11): 2558-2570. DOI: 10.7544/issn1000-1239.2021.20200621
    [5]Xu Hongzhi, Li Renfa, Zeng Lining. Parallel Task Scheduling for Resource Consumption Minimization with Reliability Constraint[J]. Journal of Computer Research and Development, 2018, 55(11): 2569-2583. DOI: 10.7544/issn1000-1239.2018.20170893
    [6]Chen Huangke, Zhu Jianghan, Zhu Xiaomin, Ma Manhao, Zhang Zhenshi. Resource-Delay-Aware Scheduling for Real-Time Tasks in Clouds[J]. Journal of Computer Research and Development, 2017, 54(2): 446-456. DOI: 10.7544/issn1000-1239.2017.20151123
    [7]WeiWei, LiuYang, YangWeidong. A Fast Approximation Algorithm for the General Resource Placement Problem in Cloud Computing Platform[J]. Journal of Computer Research and Development, 2016, 53(3): 697-703. DOI: 10.7544/issn1000-1239.2016.20148323
    [8]Qian Manli, Li Yonghui, Huang Yi, Zhou Yiqing, Shi Jinglin, Yang Xuezhi. An Adaptive Soft Frequency Reuse Scheme for LTE Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 912-920.
    [9]Yu Guoliang, Wu Weiguo, Yang Zhihua, Qian Depei. A Boundary-Table-Based Algorithm for Reconfigurable Resource Management and Hardware Task Scheduling[J]. Journal of Computer Research and Development, 2011, 48(4): 699-708.
    [10]Chen Tingwei, Zhang Bin, and Hao Xianwen. Dependent Task Scheduling in Grid Based on T-RAG Optimization Selection[J]. Journal of Computer Research and Development, 2007, 44(10): 1741-1750.

Catalog

    Article views (1123) PDF downloads (827) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return