Font Size: a A A

The Research And Design Of Security System On Mobile Device

Posted on:2017-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2308330488487322Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Nowadays, regardless of the old or the child, almost everybody holds a cellphone, pad, or other mobile electronic device. Electronic device has become more and more daily, but with the rapid development and the popularization of mobile device technology, there will be many malicious people with evil intentions to attack and crash the safety of the device so that they can benefit from it. In that case they will attempt kinds of methods, like that releasing the media files without copyright, stealing user’s confidential data illegally, replacing the user’s file with the false and so on. Therefore, no matter for the device manufacture, the user, or the device provider, we have to take into account that whether the files stored in the device is safe, whether the device can resist the malicious attacks from different aspects.This article is aimed at the file storage vulnerability exist in the device, and studying when the device is running in a trusted execution environment,which is isolated with a normal system, whether the trusted storage in the device is safe enough, resisting enough security attacks and improving the file storage security level.Firstly this paper introduce the security theory and some terms,then describe several general security attacks on android system. Then, aiming to those attacks, we study on the solutions to this attacks and the current requirements. After this,we introduce a trust execution environment, and study how it works to resist the attacks we discussed. Then according to the trusted storage function described in the trusted execution environment, we aim to studying on file storage design with the cryptography knowledge.In conclusion, the trusted executable environment this topic mentioned goodly makes up for the security functions in software and hardware which the current device does not holds, safeguarding the benefits of the equipment manufacturers, application developers and the device users.
Keywords/Search Tags:trusted executable environment, arm trust zone, security storage, open system, cryptography
PDF Full Text Request
Related items