Font Size: a A A

Research And Reatizition Of Detective Trojan Based On Android Platform

Posted on:2018-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:L MaFull Text:PDF
GTID:2348330533962706Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Smart phone has been widely used because of its easy to carry,simple control,powerful features,and now the number of users of Android smart phone has ranked first in the world.With the widespread popularity of Android smart phones and a large number of applications,There are more and more Android Trojan software,the most important feature is the highly hidden.Hidden characteristics along with highly market share provides a new way of thinking for security department to prevent crime and obtain evidence of the crime.Based on the above requirements,this paper designs and implements an Android trojan prototype that can be hidden into the suspect's mobile phone system.First of all,the article introduces the development background of the Android system,the Android theory foundation and the present situation and the characteristic of the Android Trojan horse.Then,the key technology of the Android Trojan is researched and analysised.This paper focus on the implantation of Trojan horse,and explore a set of scheme that can be hidden into the target mobile phone and evade antivirus software killing.The scheme includes the design of the Trojan into a separate APK tied to the normal APK;using 'pm install' for silent installation;using '/system/app' for anti-uninstall;using application reinforcement technology to anti-kill;using HTTP,FTP and WebSocket protocol for transmission Control and so on.According to the scheme,Trojan horse prototype is designed whice is the type of monitoring.This trojan can control the controlled mobile phone according to the remote control commands,steal target mobile phones for all kinds of privacy information,monitor the suspect and so on.Running results show that the trojan can function well,it is ideal to achieve the purpose of hidden implants,the operation of anti kill.One side,we can get criminal information of suspect,monitor and control them,so as to effectively reduce and prevent the occurrence of illegal crime.On the other hand,by the realization of the Trojan horse prototype,the key technology of Android Trojan is researched and analysised,which provides technical support for the detection of intelligent malware,and has broad market value and research significance.
Keywords/Search Tags:Android Trojan, Remote investigation and control, Android security
PDF Full Text Request
Related items