Font Size: a A A

Study And Implementation Of Android Trojan And Key Technologies

Posted on:2017-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q YuFull Text:PDF
GTID:2308330485488004Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile intelligent terminal technology, smart phones has become an indispensable communication tool in our life. Currently, mobile operating systems becoming more and more diversified, while Android system always has a high market share in recent years with its open-source, high efficiency and versatility features. Android’s security has become the focus of attention, and the attack and defense research on the Android Trojan has become a very important research topic. In order to research defense technology, we must research on Android Trojan’s attacks technology to provide technical support for the defense technology research.This thesis mainly do the following work:1.This thesis survey on research literatures of domestic and foreign,analysis t he framework of Android system to understand its security mechanisms,and find the system vulnerabilities and security theats. Investigation of the realization prin ciple, implant, hiding and communication technology of Android Trojan.2. This thesis designed an Android Trojan based on location tracking. The T rojan takes the C/S architecture model, the server is a monitoring and manageme nt software based on C# and Mysql database, the client is a normal application software that bundled with Android Trojan. Besides,this Trojan not only can get user’s personal information, but also has function that real-time access, monitor a nd analyze user’s location information.3. This thesis uses APKTool decompile Douban FM installation package, em bed trojan program into the decompile file, and then re-package to generated AP K files by APKTool,so achieve Trojan implant by software bundle technology. And use rootkit kernel hiding technology based LKM to hijack system call to re alize Android Trojan hiding.4. Coding Android Trojan monitoring and management software. The software is a x86-based Windows desktop application, which has good user interface. The software’s functions include system user management, mobile terminal management, communication data management, call data management and location information management, focus to achieve dynamic location tracking, track drawing and data analysis.This thesis verifies the validity of the Android Trojan functionality by building a simulated testing environment. Research of this thesis will contribute to the further study of Android Trojans defense technology, and has a good reference value to the safety of the Android system.
Keywords/Search Tags:Android, trojan, location track
PDF Full Text Request
Related items