Font Size: a A A

The Research And Implementation Of The Android Applications Protetion

Posted on:2016-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:C J ShiFull Text:PDF
GTID:2298330467491929Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid growth of the smart phone in the world, Androidmobile phone operating system’s market share accounts for84.7, thenumber of applications on smartphones has been more than on thePC’s.Unlike the iOS and Windows Phone, Android doesn’t reinforce theapplications before distributing, so the Android applications suffer moreattacks, eg, reverse analysis, re-package, injecting malicious code. It leadsto more and more research institutions and software companys focus onthe applications reinforcement on Android. In this paper, it introduces the Android security mechanism,represents the security threat, and analyzes the static and dynamin attacktechniques. According to this, this paper comes up with a static anddynamic security defense solution. In the static security defense solution, it designs a shell reinforcesolution using secondary-loading based on Dalvik.This solution uses thehook technology to encrypt and decrypt the DEX transparently during thesecondary loading, it ensures that the attack can’t get the byte-code filesthrough monitoring the disk. In the dynamic security defense solution, this paper designs a portmonitoring program and processes-ring program to protect theapplications from being debugged using JDWP or ptrace technology.This solution greatly improves the difficulty of the debugging in thewhite-box attack environment. Finally, this paper designs and implements a software applicationsecurity reinforcement system, which provides a transparentreinforcement service for Android applications to tamper-proofing、anti-debugging, etc. In addition, this paper carried out a system safetyanalysis, and improved the exit problems,which greatly improves the security of the system.
Keywords/Search Tags:android, application protection, shell technologyptrace, jdwp
PDF Full Text Request
Related items