Font Size: a A A

The Research And Implementation Of Mobile Phone Trojan Based On Android Paltform

Posted on:2016-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y ZhangFull Text:PDF
GTID:2348330476955339Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the deepening of the development of mobile Internet, mobile intelligent terminal devices are becoming more and more popular in people's life. Android system occupies a large part of the mobile Internet market and is open source. Especially the development of mobile payments and mobile banking makes it an important target of Trojan horse. Mobile phones carries a lot of the user's private information, and it will cause loss of privacy after being infected which has a great influence on people's daily life. Mobile security is an important issue that can not be ignored, tracing the source of intrusion, sufficient understanding should be gained to help users better prevent phone Trojan invasion. Therefore the research on key technology and mechanism of the Trojan program in Android system is of important practical significance.With Trojans based on the Android mobile phone platform as the research object,starting from the security situation and security mechanisms of the Android phone system,this paper mainly studies the key technology of the current Trojans based on android operating system,designs and implements a Trojan based on android platform through further research and improvement.First,aiming at the problem which Trojan horses rely too much on the service life cycle in the autostart process and the unstarted applications cannot have monitored the radio since version 3.1. On the basis of monitoring on broadcasts we come up with a new scheme of autostart,which not only avoid the auto launch restrictions on the service life cycle and also is compatible with the Android versions 3.1.Then,in terms of the insufficiency in single or SMS command control,this paper proposed a kind of TCP/IP + SMS control model and achieved the main processes of this model.The Trojan often ignores hidden data flow during the message-return process, while will lead to the abnormal loss of data flow and the privacy. In this paper,we offer a method that the Trojan returns message while Android system is in early suspend state. In this way,CPU is still working while the screen goes dark and the imperceptibility of the Trojan will be improved greatly.By studying technologies of the Trojan's autostart,command control,message return,privacy acquisition,we improved the reliability imperceptibility and controllability of the Trojan. At the end of the paper,functionality,performance and compatibility of the Trojan is tested.
Keywords/Search Tags:Android, self-starting, command and control, information return, Trojans
PDF Full Text Request
Related items