Font Size: a A A

Design And Implementation Of Malicious Program Detection System Of Android Based On Refactoring Technology

Posted on:2014-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhaoFull Text:PDF
GTID:2248330395497240Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of mobile network technology, smart terminalphones have played an important part in people’s lives,and they are inseparable. Theemergence of smart phones in large part to meet people’s diversified the mobileinterconnection office life needs, and gradually accepted and used by more and more users.As Google launched a new generation of smart phone operating system, Android came uponby the widespread concern, and is developing rapidly. Market research firm Canalys releaseda report on Monday, the third quarter of this year, the Google Android operating systemmarket share reached35%, and has become the world’s largest smartphone operating system.However, the rapid development, various attacks and Trojan for Android phones graduallyappear. Has a large number of public reports of malicious programs for the Android phone.Some of these malware will cause the phone to run slower, and some will be in the case ofusers do not pay attention to the phone to connect to the remote server to reveal the user’sprivate information, via SMS, etc. to steal store secret information in the phone. Thesemalicious program in terms of the majority of Android phone users, already constitutes aserious threat. Response to the growing mobile Internet security threats, to help earlydetection and effective treatment of a malicious program is extremely urgent.This article intends to conduct in-depth study in response to Android phones maliciousprograms, and proposed the scientific and feasible to find Android applications effectivesolutions to detect security threats to protect the user’s information security.In this paper, the main work is mainly reflected in:1. Research and analysis Android framework to understand the system’s operatingmechanism and security mechanisms, looking for the vulnerability of the system.2. Study analysis of current common Android application Trojan Principle and itshazards and provide the theoretical basis for a follow-up system security detection analysis.3. According to the the Android system and application, the proposed Androidapplication detection solutions and its corresponding implementation principle, pointed out the advantages and disadvantages of these programs on the safety testing.4. Presents a new technical solution-based reconfigurable technology security detection:Android application reverse engineering compiled, re-assembled in accordance withpre-defined data structure on the the decompile dalivk bytecode sensitive byte code api callsto do the a uniform warning labels, record sensitive api detailed call information and trendtracking sensitive data,re-packaged applications, dynamic simulator to verify the applicationof safety defects, and generate detailed defect analysis report.5. Using the technology to achieve a prototype of an Android application defect detectionsystem with dynamic detection application defects, while the detection system functionindicators were tested. Pointed out that the system to achieve the principles of the basis of thedetection methods and means of authentication. Comparison with other detection schemes, theadvantages of Android application security testing on detection accuracy, availability, ease ofuse and other aspects of the program.
Keywords/Search Tags:Android, Refatoring technology, Dalvik byte code, Information security, Dynamicdetection
PDF Full Text Request
Related items