Visible to the public "A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"Conflict Detection Enabled

Title"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Publication TypeConference Paper
Year of Publication2015
AuthorsD. Zhu, Z. Fan, N. Pang
Conference Name2015 International Conference on Computational Intelligence and Communication Networks (CICN)
Date PublishedDec. 2015
PublisherIEEE
ISBN Number978-1-5090-0076-0
Accession Number16248271
Keywordsandroid, Android (operating system), Android operating system, Androids, Cameras, Dalvik VM, data privacy, dynamic supervisory mechanism, Framework, Humanoid robots, Java, malicious chargeback software, Malware, mobile phones, private information, pubcrawl170105, security, smart phones, smartphone security threats, spy privacy, supervisory proces, system resource auditing, system resource monitoring, system security sensitive behavior
Abstract

The threats of smartphone security are mostly from the privacy disclosure and malicious chargeback software which deducting expenses abnormally. They exploit the vulnerabilities of previous permission mechanism to attack to mobile phones, and what's more, it might call hardware to spy privacy invisibly in the background. As the existing Android operating system doesn't support users the monitoring and auditing of system resources, a dynamic supervisory mechanism of process behavior based on Dalvik VM is proposed to solve this problem. The existing android system framework layer and application layer are modified and extended, and special underlying services of system are used to realize a dynamic supervisory on the process behavior of Dalvik VM. Via this mechanism, each process on the system resources and the behavior of each app process can be monitored and analyzed in real-time. It reduces the security threats in system level and positions that which process is using the system resource. It achieves the detection and interception before the occurrence or the moment of behavior so that it protects the private information, important data and sensitive behavior of system security. Extensive experiments have demonstrated the accuracy, effectiveness, and robustness of our approach.

URLhttps://ieeexplore.ieee.org/document/7546287
DOI10.1109/CICN.2015.232
Citation Key7546287