Font Size: a A A

The Design And Implementation Of An Android-Based Remote Control Tool

Posted on:2014-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:S WangFull Text:PDF
GTID:2268330401953756Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of mobile terminal technology, smart phone is becomingincreasingly common in people’s daily life. Featuring its open-source and richapplications, Android, one of hottest topic in current research, holds the highest marketshare in mobile phone operating system. However, an increasing number of Trojans arethreatening the security of Android platform that force the operating system to face thewholly new challenge. Remote control Trojans cause huge damage to Android so that itseems very urgent to have an in-depth study on it. It is an effective method that takesadvantage of loopholes in the Android to implement an Android-based remote controlsimulation. So the design and implementation of an Android-based remote control toolhas important significance for Android vulnerability analysis, safety evaluation andreinforcement.On the basis of comprehensive analysis of Android and current research at homeand abroad, this paper conducted an in-depth study on security mechanism of Android,analyzed the privilege escalation method of Android, proposed a way to escape thepermission checking mechanism of Android through privilege escalation vulnerability,designed and implemented “Rootable Remote Controller” by combining remotecontrol theory and technology. This conteoller can control the Android phone throughSMS, and get the sensitive information in the phone, which would uploaded to thedesignated server. At last, the controller is proved correct in design and available infunction.Based on analysis of security mechanism of Android, this paper proposed a way toescape the permission checking mechanism of Android through privilege escalationvulnerability. It is of great importance for enhancing the security of Android. In themean time, the principle of implementing the Rootable Remote Controller designed inthis paper lays a solid foundation for future Trojan detection.
Keywords/Search Tags:Android, Privilege Escalation, Trojan, Remote Control, Security
PDF Full Text Request
Related items