Font Size: a A A

The Android Security System Analysis

Posted on:2014-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2248330398457592Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Android platform is an intelligent mobile phone based on Linux2.6kernel, which is developed by Google; Due to its openness and scalability, it attracts more and more mobile terminal manufacturers and developers to join, so the Android systems gradually occupy most of the market in the smart phone and tablets. For this reason, the security is more and more widely appreciated, and Google in the design of the Android system, considers its security and establish a more perfect security system. So now it is necessary to analysis and researches its security system, analysis of the inadequacies of the proposed, so can find the solution to the problem of Android security.The main research contents of this paper are as follows:1, Under the premise of introduced Android structural system, by analyzing the source code to view the official security documents, analysising of the Linux security mechanisms, studying to relevant research literature, respectively. From the inner nuclear layer of the Android system, the core library and virtual machine layer, the system framework layer and application layer to analysis the security mechanism. To analyze each security mechanism, carried out a detailed analysis and research the principle and implementation process on important security mechanisms, such as rights management mechanism, digital signature mechanisms.2, Through the analysis of the security mechanism of Android, can draw the structure and security features of Android security system and the security risks caused by the imperfections safety mechanism. Android security mechanism is the core sandbox mechanism and rights management mechanism, sandbox can make the processes in the system generally can not access each other, which would allow a separate program running on the phone in the closed environment of its own, independently of each other, does not result in the leakage of data; there is access permissions mechanism to manage the application on your phone’s features and resources, such as access to the network, send text messages, so the need for the application of the appropriate permissions to read the contact information. Android security system is characterized by:generally safe, but there are some security risks, such as defects in the permissions mechanism, system vulnerabilities.3, According to the characteristics of the current Android security problem:Malware infestation, serious harms to the user’s privacy and calls, but threatens the safety of the normal operation of the system is small, or is not serious. The solution proposed in this paper to modify the model of dynamic authority abnormal behavior based on monitoring for security. The model can be used for monitoring the software running in the system, when listening to a software abnormal behavior, an alarm will be generated, and allow the user to modify permissions, against those who produce abnormal behavior of the authority.The focus study and innovation of this paper is to:a multi-level security Android detailed analysis and research, and come to its security architecture and due to imperfect due to some security issues, and the last for the current security issues solutions. The solution combines the advantages of intrusion detection and permissions dynamically modified, can solve the current security issues, and have a certain degree of innovation.
Keywords/Search Tags:Android, Security mechanism, malicious software, Intrusion detection, Safetyprecautions
PDF Full Text Request
Related items