Font Size: a A A

Android Software Platform Based On Technology Research

Posted on:2015-09-15Degree:MasterType:Thesis
Country:ChinaCandidate:S Z WenFull Text:PDF
GTID:2298330467463128Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of smart mobile device that used Android system, the development of Android-based applications also develop rapidly. These applications contains knowledge and labor of developers. However, since most of these applications based on Java language and the deficiency of code protect of Java language, the malicious can be easily decompiled and attacked these applications. At last, the economic interest of developer and the privacy of user will be damaged. At present, the research of protected Android-based applications just starting and there have no solutions that can protect these application effective.In this paper, the Android platform itself stratification characteristics, combined with traditional software protection technology, design and implement software protection system based on encryption, integrity verification and signature authentication. The system can be effective for the application source code for anti-reverse engineering protection and the protection of the integrity check.The main work is as follows:(1) Discusses the Android system architecture and layering mechanism, and the type of software security threats were divided and traditional software protection techniques are classified research, mainly ELF file packers technology and Java byte code protection technology. Ultimately, the combination of Android own characteristics, the traditional software protection techniques in Android platform usability analyzes, and on this basis, an Android platform code designed to protect the assessment model.(2) On the above basis proposed Android software protection scheme based on encryption and tamper resist. Developers use the system gives the program after the application development, application encryption, signature and reverse boycott protection. The program is based on the Android system and Native layer application layer protection system, the application for protection, the key and authentication information stored in the Native layer, so the library, and the library were packed so protected. Such information is only applied when the system starts to get, and only in the shelling of applications and decrypting executable before, because these processes are carried out in memory, which prevent the generation and storage of temporary files to ensure that the source such confidentiality protection.(3) Specifically designed and implemented a complete Android platform software protection system, which implements to protect of software security, confidentiality and authentication. Tested the function of the protected software and proved it can be accepted when the start time increased in the certain interval.
Keywords/Search Tags:Android, Software Protection, Encryption, Integrity, Reverseengineering boycott
PDF Full Text Request
Related items