Font Size: a A A

Design And Implementation Of Android Os Security Enhancement Scheme

Posted on:2013-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z W LiuFull Text:PDF
GTID:2248330395468129Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile communication technology and mobile device intellectualized, an increasing number of new Internet businesses have come out and become more and more flourishing. However at the meantime, mobile device also need to face lots of threats. First of all, private information and trade secrets begin to depend on the mobile device; leaking such information will lead to immeasurable results. Secondly, malicious ordering, automatically dialing voice station, automatically connecting the Internet will also result in the user’s money loss. What’s more, Trojan software can even dominate user’s mobile device and then steal user’s account, eavesdrop calls and send local information to other devices. Mobile device, as the primary carrier of mobile Internet time, has thousands of challenges to overcome. Based on the analysis of Android malicious software and security status, we can conclude that there are still some big security issues about the rights management of applications and private information protection in Android mobile operation system. In this paper, we mainly focus on improving the security of Android system, providing a method to detect and control malicious software, which has both theoretical research and practical value.In this paper we introduce the security mechanism for Android system and point out its security issue. Then analyzing all malicious software status in Android system and introduce some basic malicious software preventing method for Android system. Finally based on Android system, we provide a new security mobile system SecDroid, which combines the static detection and dynamic monitor technology, protects user’s private information, system data and sensitive system harmful security behavior in several levels. Using data flow tracking technology to detect whether user’s sensitive information is leaked, abused or not, and using dynamic monitor technology to monitor and prevent sensitive behavior in application level, system level and inside core level, finally realize the detection and monitor of Android malicious software.Expanding the Android operation system, we design and achieve the prototype system SecDroid based on data flow tracking and key API blocking technology, then interpreting the modular design and algorithm of the prototype and finally showing out the results of the prototype and verifying its availability and feasibility. In addition, we also point out some shortcomings and prospect for future research.
Keywords/Search Tags:Android security, malware, privacy protection, propagation analysis, behavior monitoring
PDF Full Text Request
Related items