Font Size: a A A

Research And Application Of Constructive Method Of Credible Mobile Terminal Software Based On Behavior Declaration

Posted on:2019-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:D FengFull Text:PDF
GTID:2428330593950042Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile internet technology,all kinds of mobile software have been deeply into people's daily life,so to speak,they are changing people's lives.With the increasing abundance of mobile application content,more and more complex structure and increasing scale,a large number of malware appears in the application market.Especially for Android applications,because of it openness and open source of Android operating system,and there is no unified application release platform and effective control mode,which makes the user in the process of operating software face the risk of privacy theft,no reason to be deducted.Therefore,how to ensure the credibility of Android terminal software construction has become a key issue to measure its quality.The research on software credible construction method is an important field of trusted computing,and it is also a research hotspot in current environment.At present,there is no unified definition of software trustworthiness.This paper refers to the research of other scholars,the definition is as follows: software trustworthiness refers to the ability that the behavior and results of software conform to the user's expectations and can still provide continuous service when it is disturbed.In the process of constructing trusted software,the statement of trusted behavior of software is a special descriptive file,which describes the expected behavior of software related to software trustworthiness.This paper has carried on the detailed research to the Android system characteristic and the Android terminal software behavior characteristic.In the analysis of trusted requirements,the definition of risk identification is given,and the mapping of Android permissions and risks is made.The method of acquiring the Android terminal software risk is proposed.After that,a hierarchy-based model for obtaining trusted attributes was constructed,and the specific attributes of the project were extracted and described based on specific project cases,so as to apply the method of obtaining trusted requirements.In the stage of software credible design,the process and method of defining the credible behavior statement based on Android are studied,including the framework design of credible behavior statement,the definition of the behavior constraint parameter and the definition method of the content of the credible behavior statement.The general mechanism of the letter is used to assist its implementation of the trusted function,and a detailed design method is given;finally,a trusted design method of the functional module of the terminal software is provided in combination with the trusted common mechanism.At the stage of trusted implementation and verification of mobile terminal software,a trusted verification flow based on behavioral claims,a method of generating trusted test cases,and a trusted implementation were proposed.For each functional module of the terminal software,this paper specifically describes the corresponding Authentication method.
Keywords/Search Tags:risk, Android application software, credible behavior declaration, trusted software structure
PDF Full Text Request
Related items