With the rapid development of the Android platform, Android now has become an operating system of intelligent mobile phone with the largest number of applications and users, huge commercial interests encourage more and more attacks toward Android’s application data (AAD). Though Android platform has some security measures such as sandbox isolation mechanism of process, permission declaration mechanism, application signature mechanism and so on to ensure the security of the system, but it still can’t stop the numerous attacks toward the system and software vulnerabilities, the security of AAD is facing challenges in this process, especially for some user privacy data or some important account and password data. Therefore, when developers develop applications, on the basis of the existing Android security mechanism, should also take more new security measures to protect the security of AAD, thus maintenance of the user’s and software owners’ interests.In this background, aiming at ensure the security of AAD, this paper analyzed Android’s system architecture, security mechanism and its’ application data security threats in detail, and then in-depth understanding of the attackers commonly used means to obtain AAD. At last this paper provided an application data protection scheme based on Android platform, include scheme’s overall design and detailed design. The scheme protects the security of AAD based on the seven protection, including password protection, reverse protection, dex(Dalvik Executable) protection, communication protection, component protection, memory protection and bypass data protection. The main work of this paper are as follows:1)On the basis of deep analysis of Android’s system architecture, security mechanism, this paper deeply analyzed AAD security threats.2)Deeply analyzed the attackers commonly used means to obtain AAD by way of example. And then analyzed the system’s vulnerabilities and software’s vulnerabilities used by these means, and put forward specific objectives of this paper3)Design and implementation of the application data protection scheme based on Multi-layer protection, and in-depth introduction of the function of each layer and the dependencies between each layers. Layers of the Multi-layer protection scheme are not independent, they constitute a whole to protect the user’s application data security. Among them, password protection is the foundation of the whole system, reverse protection and dex protection can effectively protect the other layers’ code security, and communication protection module can protect the safety of other module’s communication data from attack.4)Analysis of this scheme’s anti-attack capability through specific examples of simulated attack and anti-attack, and then proving of the availability of this scheme system by performance testing. |