Font Size: a A A

Vulnerability Analysis Of Android Application Based On Component

Posted on:2017-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z P HuangFull Text:PDF
GTID:2348330518495591Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the smart phone market,Android operating system as the world's most popular smartphone operating system more and more deeply involved into the lives of people,plays more and more important role in all aspects of social,communications,finance,work and etc.At the same time to bring the convenience,vulnerabilities that exist in Android system and application bring security threats are growing.In this paper,the Android system and the mechanism of the components are deeply studied,the vulnerability of the components in the Android application is analyzed,and the vulnerability of vulnerability is extracted.Finally,based on the design and implementation of vulnerability signatures for Android application components related vulnerability detection system,and using the system for Android practical application vulnerability analysis.Specific research article as follows:1.Android component mechanism studied system,summed up due to the presence of defects in components of the mechanism and cause a variety of loopholes and harm,then analyzes the Activity fishing hijacking,components hijacking,ContentProvider SQL injection vulnerability and Intent implicit call Fishing lead hijacking vulnerability,and vulnerability is feature extraction.2.Based on the vulnerability of feature extraction,design and implement a testing system for component-related vulnerabilities,through rational use of stains and movement tracking technology combined with detection technology,improve the Android components related vulnerability detection accuracy.Using the actual application of the system to test,verify that it has good stability,and has been compared to the detection system has a higher accuracy.3.In order to analyze the components related vulnerabilities exist in practical application,this paper from the Android Market to fetch a lot of popular applications were detected and analyzed.Test results show that the prevalence of components related to the current application vulnerabilities 442 vulnerabilities exist related components used in 500 applications,representing 88.4 percent of total applications tested.Finally,according to the test results,this paper provides the developer with the vulnerability of the proposed repair.
Keywords/Search Tags:android, component-invocation, fishing-hijack, component-hijacking
PDF Full Text Request
Related items