Font Size: a A A

The Research On Data Protection Of Android

Posted on:2016-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:X D QuFull Text:PDF
GTID:2308330464471250Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the times, intelligent systems such as the intelligent mobile phone, intelligent home furnishing is rapidly changing people’s life. With the smart phone’s most outstanding performance, only a few years, the smart phone has occupied most of the world’s mobile phone market. The Apple company’s IOS system and the Google company’s Android system are the most representative. The Android system is the excellent operating system, which is based on Linux2.6 kernel.Compared with the IOS system, Android system has a higher open, so more and more terminal equipment manufacturers and developers joins the Android camp.Although Google company has established a set of more perfect security system in the design of Android system at the beginning. But because of the openness,Android system is more vulnerable for various malicious software and virus, and then brings unnecessary losses to the user. So it is necessary to analyze and research the security architecture of Android and to find out the potential risks of them. Then putting forward some solutions for some specific hidden dangers to safety.The following is the main research contents of this paper:This paper made from system Android intelligent mobile phone system as a point of departure, in the first checked the system source code and some research literature.And then the paper checked the security mechanism of Android System. It included all the hierarchical of Android system: the Linux kernel layer, the Dalvik virtual machine layer and the core library layer(Core Libraries), the system framework layer(Application Framework) and the application layer(Application). We described in detail the main security mechanism of each layer, and described the principle and implementation detailed of some mechanisms, such as the permission mechanism,application sandbox mechanism, the digital signature mechanism.Based on the study of the Android system and the study of security system of Android system structure, we analyzed the security features and the possible hidden trouble of the Android system. We analyzed the permission mechanism and application sandbox mechanism in detailed. Overall these security mechanism of theAndroid system can ensure the security of the system, but there are still some hidden dangers, such as the hidden danger of system loopholes, the hidden danger of data security, the hidden danger of safety mechanism.Based on the system security problems of the Android mobile phone system, we firstly analyzed the cooperative attack problems caused by hidden dangers of Android permissions, and the data leakage problems caused by this hidden dangers. Then we analyzed the solution of this problem, and made some optimization for this solution.At the same time according to the system structure of Android, we put forward the protection strategy to protect data by hooking the system API on the virtual machine layer, including data filtering and data encryption. We described the Hook API theory and the use of the Sqlite database in detailed. And then we described the injection of the *.so files and the Android JNI programming theory. Finally we successfully hooked the message sending events by hooking the methods of the system service Sms Manager class. And then we handled the date of the methods. Through the experiment, we have achieved the desired results. This plan made some innovation.
Keywords/Search Tags:Android, Security mechanism, Hook API, Data protection
PDF Full Text Request
Related items