MOBİL KÖTÜCÜL YAZILIMLAR VE GÜVENLİK ÇÖZÜMLERİ ÜZERİNE BİR İNCELEME

作者: Anıl Utku , İbrahim Alper Doğru

DOI:

关键词:

摘要: Gunumuzde mobil cihazlar her zaman ve yerde farkli cesitlerdeki servislere erisme imkâni saglayarak hayatimizin onemli bir parcasi haline gelmislerdir. Son zamanlarda GSM, GPRS, Bluetooth Wi-Fi gibi tarafindan kullanilan baglantilarin sayisinin artmasiyla birlikte cihazlarin mekân kisitlamalari ortadan kalkmistir. Bu sebeple iletisim kanallarini hizmetlerini istismar eden guvenlik aciklarinin sayisinda cesitliliginde artis yasanmaktadir. calisma kapsaminda icin cozumleri uzerine arastirmalar yapilarak kapsamli bakis acisi sunma hedeflenmistir. Mobil uygulamalardaki aciklari, tehditler odaklanilmistir. Kotucul yazilim tespit yontemleri, mimariler, toplanan veriler isletim sistemlerine dayali olarak cihazlari korumaya yonelik yaklasimlar incelenmistir.

参考文章(40)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna, PiOS : Detecting privacy leaks in iOS applications network and distributed system security symposium. ,(2011)
Daojing He, Sammy Chan, Mohsen Guizani, Mobile application security: malware threats and defenses IEEE Wireless Communications. ,vol. 22, pp. 138- 144 ,(2015) , 10.1109/MWC.2015.7054729
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
S. Arunkumar, M. Srivatsa, M. Rajarajan, A review paper on preserving privacy in mobile environments Journal of Network and Computer Applications. ,vol. 53, pp. 74- 90 ,(2015) , 10.1016/J.JNCA.2015.01.008
Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou, Analysis of Android Applications' Permissions 2012 IEEE Sixth International Conference on Software Security and Reliability Companion. pp. 45- 46 ,(2012) , 10.1109/SERE-C.2012.44
S. Nari, A. A. Ghorbani, Automated malware classification based on network behavior 2013 International Conference on Computing, Networking and Communications (ICNC). pp. 642- 647 ,(2013) , 10.1109/ICCNC.2013.6504162
Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang, Detect Android Malware Variants Using Component Based Topology Graph trust security and privacy in computing and communications. pp. 406- 413 ,(2014) , 10.1109/TRUSTCOM.2014.52