Font Size: a A A

Research For Information Security Based On Android Smart Phones

Posted on:2014-12-26Degree:MasterType:Thesis
Country:ChinaCandidate:P C WangFull Text:PDF
GTID:2268330401484019Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Compared with traditional mobile phone, smart phone has much more rich functionality and strong ability in data processing, besides, Android has been developing rapidly in recent years, it is an open source system, has strong portability advantages, therefore, more and more intelligent mobile phone use Android system as their mobile phone operating system. With the popularity of Android smart phone, and improvement of people’s security consciousness, the security of Android smart phone get more and more of people’s attention. People’s mobile phone contains a large number of user’s private information, and is directly related to user’s economic interests, so how to protect the information security of Android smart phone, is a very important topic.In order to solve the problem about information security of Android smart phones more effectively, this paper carry out the research work from the following several aspects.(1) This article research the Android system and Android system’s own security mechanism first, based on that analysis and put forward the problems existed in security mechanism of Android operating system. Secondly, analyze the existing security measures Android smart phone used for protect itself, and the existing measures mainly realized by two approach to detection and monitoring malware, they are static comparison and dynamic analysis, but these two approach also have there own defects.(2) Combined with the ways Android smart phone used for security defense we already know, puts forward the concept of security zone for smart phone, by adding a security hardware partition and use some software encrypt this special partition, to protect user’s private information. For the data contained in this safe partition, the action request for these data which not in safe partition must through security audit first, if the request can be approval, the operation of the data must be execution by the trusted program in the safe partition, other than the program in safe partition, the others will not have the permission to manipulate the data in safe partition directly.(3) To make sure the safety partition can be loaded normally, this paper come up with the way to protect the Bootloader boot up correctly, validate the Bootloader before boot up or before system upgrade, to make sure the Bootloader not be unlocked or replace easily, accordingly, figure out the idea for verification measures Bootloader while launch and upgrade using boot up key and secure boot up key, to ensure that mobile phone is not be unlocked easily by these two key, and safe partition can also be loaded normally.(4) According to problem more and more common within mobile phone’s firmware upgrade because more and more people want to upgrade their phone, to assure the safety of progress while upgrade phone, put forward a safer way to upgrade. Test the upgrade file will used for upgrade at the first, then integrity monitor the upgrade process, show the upgrade process to customers, and give some tips to them after upgrade success, make sure the safety of mobile phone’s upgrade effectively.
Keywords/Search Tags:Android, Secure Zone, Boot loader, Update
PDF Full Text Request
Related items