Font Size: a A A

Design And Implementation Of Android Vulnerability Detection And Evaluation System

Posted on:2015-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:S L LvFull Text:PDF
GTID:2298330467463837Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Android system has come into use in2007. By virtue of its powerful features, customization and excellent user experience, it has achieved great success. However, as Android system is becoming increasingly popular, the number of malicious software on its platform is growing larger, and attacks against the Android system are getting stronger. The reason why Android system is faced with severe security problems, on one hand, it lacks examination and publication of a variety of the applications by the application stores, which causes the malicious software transmit via networks, on the other hand, Android system itself has various types of vulnerabilities.This paper aims to establish the vulnerability detection and assessment system by studying the vulnerability of the Android system. This will not only facilitate detecting system vulnerability to protect the security of user privacy and property, but also promote related companies to pay more attention on the security of smart terminals to provide support for the development of a more comprehensive security precautions.This paper first studies the security mechanisms of the Android system, and analyzes the common viruses on Android. Secondly, the paper analyzes traditional computer vulnerability taxonomy, summarizes the vulnerabilities faced by Android system, under which proposed a system suitable for Android system vulnerability classification scheme. The scheme comprehensively examines and classifies Android system vulnerabilities based on security threats and system level. Next, the paper gives a detailed description of the design of Android system vulnerability detection and evaluation system, including overall design, interactive process design of the modules and the design of data dictionary. Next, the implementation of the system is described in detail, including a detailed description of the class diagrams and interfaces of the modules, and presenting the resulting screenshots of the programs. Thereafter, this paper gives several representative test cases, uses three different versions of the Android system as the test object to test the system, and shows the test results. Finally, this paper gives the conclusion, and provides further research proposals.
Keywords/Search Tags:android detection, evaluation, vulnerability taxonomy
PDF Full Text Request
Related items