Font Size: a A A

Research On The Protection Of Personal Privacy Based On Android Platform

Posted on:2018-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z SuiFull Text:PDF
GTID:2348330518987186Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, with the development of Internet technology, the popularity of high-speed mobile network, mobile application market growth, user-generated data rapid growth, to promote the status of mobile Internet has been improved. At the same time, mobile intelligence also saves more and more personal sensitive privacy data, a variety of software are trying to get this information for different purposes, so mobile security more and more attention. In recent years, due to a large number of servers and software vulnerabilities caused by a lot of personal information leakage events, the company's interests and even the country has brought huge losses.In order to prevent malicious attacks, not only need to understand the principles of attack, but also to understand his technical means, and better than the attacker to find the system and the network itself loopholes. For systems and networks to provide better protection, to avoid malicious attacks. This article on the Android network penetration test, the use of Metasploit framework, the user attacks, access to the user's privacy data, the introduction of powertutor Android power consumption test, record and analyze the data, and then use the anti-compiler tool to understand how to attack the attacker Use the vulnerability to achieve the user's attack, and thus better protect the user's data and systems.Analysis of the mainstream software protection, including code confusion,software reinforcement, reinforcement is divided into four, namely, source code encryption, anti-secondary packaging, so file protection, resource file protection, the current DEX reinforcement protection technology enumeration. In the field of cryptography, the symmetric cryptography DES, AES, public key cryptography RSA and Hash functions are studied and analyzed.In the back of the article, focuses on the QQ chat software, WeChat chat log monitoring, the user will need to chat records and telephone recordings by mail. In the analysis of the process of recording, recording and analysis of encryption, cracking process, for other mainstream social software security comparison. This paper analyzes the feasibility of user privacy protection and puts forward some reasonable suggestions.
Keywords/Search Tags:Android, Penetration testing, Cryptography, Decompiling
PDF Full Text Request
Related items