Font Size: a A A

Research On Attack And Defense Technology Of Android Smartphone Trojan

Posted on:2018-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:L G YuFull Text:PDF
GTID:2428330512966947Subject:Communication and Information Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology,the world's Android smart phone use has exceeded the number of computer users.Smart phone has become an indispensable tool in daily life,it is with the Android smartphone,making Android smart phones become an important target of the attacker,which makes people more and more worried about the security of smart phones.This article focuses on research of the use of the elevate permissions loophole of Android system to implantation Trojan virus,the principle and specific use of the vulnerability of the steps to conduct in-depth analysis,and summarize the main features of these vulnerabilities,and then based on the latest SEAndroid mechanism proposed to be able to effectively prevent the use of the Android system,the vulnerability of the implantation of the vulnerability of the Trojan horse method.The main research contents and the research results are as follows:(1)learning and analysis of Android system architecture and its security mechanism.And then on Android system security mechanism of the flaws are studied.By analyzing a variety of known Android system weights of vulnerability,and summarize the characteristics of this type of vulnerability.By analyzing and researching Android operating system security mechanism,to find out the shortcomings,at the same time,combined with domestic and foreign security vulnerabilities on the Android system,to identify a method that used the browser vulnerabilities exist to enhance the authority to attack the Android mobile phone;At the same time,design and implementate a type of vulnerability can be used to implant into the Android phone Trojan virus.According to the results of the analysis of the common characteristics of this type of vulnerability,in order to find the right to use the vulnerability of the Android smart phone attacks on the Trojan virus method laid the foundation.(2)By analyzing the SEAndroid mechanism and combining the features of browser exploit vulnerabilities,this paper proposes a kernel vulnerability and data packet filtering method combined with the right of the vulnerability vulnerability prevention module,and through the effectiveness of the proposed prevention module authenticating.The entire defense module is divided into kernel attack prevention module and when the kernel attack defense against failure after the supplementary prevention module,among them: the kernel attack defense module will be based on kernel hardening technology based on SEAndroid mandatory access control process protection mechanism;after the failure of the kernel attack defense module will be added through the iptables module to achieve a white list of network links to limit the malicious process of the network link to prevent malicious applications to download and send the background server to the victim's privacy in the mobile phone information.
Keywords/Search Tags:Android system, Mobile phone Trojans, Elevate permissions loophole, Mobile phone firewall
PDF Full Text Request
Related items