Font Size: a A A

The Research Of Permission Abuse Detection For Android Platform Techniques

Posted on:2016-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:S Q WangFull Text:PDF
GTID:2348330518982660Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid progress of intelligent terminal,and the improvement of the wireless communication network infrastructure,the development of the mobile Internet has realized the rapid and cross-cutting expansion and the smartphone has the tendency to replace the computer as the main equipment connected to the Internet.At the same time people are enjoying the application boom,the corresponding security issues are also increasingly prominent.As the fastest growing smartphone operating system,Android brings serious security hidden danger for its characteristics of open source,such as privacy steal,malicious fee,even the destruction of the system and so on.Therefore,analysis and monitoring of intelligent operating system security is very necessary.In this paper,we choose the most popular smartphone operating system,Android,as our study aim.Based on the analysis of Android platform structure and security mechanism,we discuss the permission-based security mechanism features,and point out its disadvantages.Through the analysis of detection method,some theoretical foundation is put forward which the following design will be relied on.Through the analysis of the permission features of Android applications,we describe a model of permission abuse detection to cover and quantify the categories of all cases logically.And then provide a method in which we combine static permission analysis with dynamic Inter-process Communication detection.Utilizing the permission set mapping and taint tracing techniques,permissions abuse behavior of the Android applications can be identified.We test the detection method on 100 applications available online and the results indicate that the proposed method can effectively detect permissions abuse in different form and has a significant promotion in terms of coverage and accuracy.
Keywords/Search Tags:Android, Permission abuse model, Reverse engineering, Dynamic taint analysis
PDF Full Text Request
Related items