Font Size: a A A

A Research And Implemention Of Software Tamper-proof Protection On Android

Posted on:2016-07-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q F RenFull Text:PDF
GTID:2308330482977529Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile internet, various applications on mobile terminals, as a bridage which connect the users with smart terminals, are playing an increasingly important role. However, the security threats are also more serious. These threats bring several security issues, which include malware, software piracy,crack,illegal ads and so on. All these above are main obstacles for further development of mobile internet. Therefore, how to prevent the mobile applications from being tampered and attacked is a problem need to solve as soon as possible.In order to improve the security of Android application, we present a protection method, called TDAppGuard, to enhance applications’tamper-proofing abilities. This method has a research meaning and application value.The research of TDAppGuard includes the following three aspects:Firestly, Security threat analyze and research of Android applications, we have a detail introduction on the system mechinism and application construction of Android platform, and base on these above we point out the main existing security issuses. Meanwhile, in this paper, we analysis and classify the existing threats on Android. And finally we extract the abstract model and procedure of tampering attack.Secondly, we propose a method for based on the guards network with time diversity for the tamper-proofing of Android applications, which provides a multi-level protection for the codes, core algorithm and sensitive data. In this part, we firstly introduce the guards net’s architecture, building constraints and the implementation of it’s time-diversity by dispatcher. Meanwhile, we also give three security optimized methods for the dispatcher.Thirdly, we design and implement the system prototype, with a detail introduction of the modules and algorithm. Then we give a detail analysis and verification on the effectiveness and feasibility both in theory and experiment.
Keywords/Search Tags:Android Software Security, Tamper-proofing, Guards Net, Time Diversity
PDF Full Text Request
Related items