Font Size: a A A

Design And Implementation Of Android Mobile Phone Security Risks Display System

Posted on:2017-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:S Q MaoFull Text:PDF
GTID:2308330485959779Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of information industry in recent years, mobile Internet and smart phone-related business has undergone tremendous changes. Due to the openness of Android platform, a growing number of smart phone using Android as the operating system, which attracts abundant consumers. With the increasing awareness of security, now people pay more and more attention on the safety of Android terminal devices, the security of Android smart phone has attracted more and more people’s attention. As the mobile phone storages a large number of user’s private information that related to the economic interests of users directly, an effective way of information protection matters the most.In order to present the common means about theft of Android terminal devices intuitively, we analysis Android system security mechanisms carefully in this paper. Meanwhile, we design and implement a display system about the security risks of Android mobile phone, which can make the users fully recognize the seriousness and imperceptibility of mobile security threats.This system combines the traditional remote control technology and emerging Android application development technologies. Based on remote control technology, this system has finished building the overall environment, established communication model between monitoring host and mobile terminal, and implemented the program of control terminal through Java GUI programming technology. Taking advantage of Android application development technology, the system has implemented multiple means of theft be aimed at Android phone from the level of Android API, Android Root permissions and Xposed framework. The means of stealing information which the paper focused research on mainly including the intercepting of call, the intercepting of SMS, remote camera shooting, the acquisition of location, shutdown hijacking, acquisition of application login information and so on. The test results has displayed not only effectiveness but also compatibility of the system, since it can monitor most Android terminal model and also apply to prevalent version of Android system.It should be noted that the fundamental purpose of the display system is not to attack Android system, it aims to study the method of attack and sum up corresponding preventive measures, in order to eliminate potential security risks fundamentally. Therefore, be aimed at the means of theft occurring in the system, this paper gives a detailed defense program for Android users reference at last.
Keywords/Search Tags:Android, The security of App, The leakage of privacy data, Remote monitoring system, Security defense scheme
PDF Full Text Request
Related items