Font Size: a A A

Design And Implementation Of Security Protection System Based On Android

Posted on:2016-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:G D XuFull Text:PDF
GTID:2308330470463975Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile Internet, Android system is widely used in mobile terminals. Whether a variety of private data, economic interests, business information, or the open-source in Android system, are making it a target for hackers.So how to protect the mobile phone operating system security is the current problems to be solved.In this paper, we first analyzed the development of malware of Android system and the safety issues highlighted ceaselessly in recent years. Aimed at the security protection technology of Android system, discussing the domestic and foreign research status and trends, then analyzed the Android security architecture deeply from the point of permission mechanism, the four components and data security. In addition, we proposed the security protection system from three aspects of known malware scanning, dynamic behavior interception abnormal flow analysis. By comparing the signature database, the malware scanning modules determine whether to kill, for unknown software we utilize process injection technology. Asking the user whether to allow, when the sensitive behavior occurs, if you allow such a behavior, we can also analyze whether it is a malware through monitor the flow of the program. Finally, through the analysis of the effectiveness of various functions,memory usage, cpu occupation, flow consumption, power consumption and so on,we proposed in the paper proved that the scheme can prevent the phone viruses and the malware wanton destruction in Android system and improve system security on the basis of a minimum consumption of phone resources. In the last part of the article, we analyzed and summarized the existing problems of the system and proposed a perfect direction of improvement.
Keywords/Search Tags:Android, Security protection, Injection process, Monitoring
PDF Full Text Request
Related items