Font Size: a A A

Android Application Detection Research And Implementation Based On Software Security Policy

Posted on:2014-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:W W LiuFull Text:PDF
GTID:2268330425470892Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Since2005, developed by Andy Rubin, Android has gradually become the world’s most popular smartphone operating system. Due to the openness of the Android platform source code, the use of malicious applications access to phone contacts and open common value-added fee-based services and other malicious acts, how best to efficiently determine the security of the application, to enhance the practicality of the Android smart phone application detects and efficiency is the focus of current research in this field.This paper analyzes the advantages and disadvantages of the current Android platform application detection technology. Currently widely used detection method of application is limited to the source code detection, consumption, one-sidedness. This thesis, based on the application of software behavior detection, classification, design and realization of self-defined security policy language and syntax with malicious applications features and semantic rules, application security static detection based on the behavior of malicious applications system testing and results analysis were made. Users can be configured through the system independent safety testing strategy, the system in the phone application software is installed, the user is free to set security policies and detection software application permissions configuration to match, and timely feedback of test results; Second, based on permissions list Permission UID identification mechanism, define the appropriate strategies for different types of applications, design applications dynamic detection system, run-time dynamic detection, according to the application software to the user for permission to create a list of permissions, and the application is running when applied for permission for comparison to determine whether they have additional privileges and the effective recognition of the existence of the malicious program behavior.In this paper, through the design and implementation of application detection system based on software security strategy, user-defined security policy from the application installation and runtime both cases, a combination of static and dynamic testing of policy-based, not only provide users with greater autonomy, and to solve the problems of traditional issued certificate by low efficiency and code detection consumption significantly enhance efficiency, and have high accuracy, can effectively prevent malicious software direct attacks and privilege escalation attacks, to protect the safety of the user’s system. Figure31, Table10, Reference55.
Keywords/Search Tags:custom policy, behavior detection, static detection, dynamictesting, privilege manage
PDF Full Text Request
Related items