Font Size: a A A

Research On Monitoring And Protection Model With Controllable Granularity Of Permissions In Android Software

Posted on:2022-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:X G XiangFull Text:PDF
GTID:2518306536496774Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularization of networks and the rapid development of smart mobile terminals,application software on mobile phones has become a new product of the era after the personal PC era.Due to the convenience of mobile phones,users are now accustomed to using smart phones to store personal information and business data.At present,there are a wide range of Android mobile phone users and the Android system has a huge ecosystem.However,due to the coarse-grained permissions mechanism of Android,the software abuses the coarse-grained permissions to leak data frequently.Therefore,people are eager to store personal privacy data in a safer way.You can use more fine-grained permissions to limit software data leakage,and can have a more comprehensive detection and monitoring of mobile devices.This topic is based on the Android system,and based on the TaintDroid model,a monitoring model with controllable software permission granularity is constructed.Firstly,it describes the development status of domestic and foreign Android application permission granular control and protection models,and summarizes the disadvantages of the existing Android application permission granular control and protection models.To this end,the permission management control system and protection mechanism in Android are studied,and the overall structure of Android,the basic composition of the application and the security mechanism are reviewed.Secondly,a fine-grained authorization verification method based on the MAC expansion slot is proposed,combined with the method of real-time monitoring of the information flow of the TaintDroid model,and a monitoring hierarchy model with controllable software authorization granularity is constructed,which describes the functions and inter-level functions of the model In the interactive process,the realization principle and design scheme of each module in the management and control layer,monitoring layer and file data layer in the model are given.Thirdly,combined with the design of a monitoring model with a controllable software permission granularity,the main functions of the management and control layer,the monitoring layer and the file data layer are realized.In the way the software obtains and leaks private data,add expansion slots and request interceptors,use the tag module of the TaintDroid model to monitor the data flow,build a MAC expansion slot-based file access control method for fine particles,and control the software for fine-grained file data The access to the Android system achieves the effect of fine-grained Android permissions,and solves the problem of software abuse of permissions caused by the Android system's coarse-grained permissions mechanism to leak data.Finally,according to the hierarchical model and its monitoring software,the monitoring application for Android mobile devices is implemented.Taking the contact information permissions in mobile devices as an example,the monitoring process of the model under the condition of malicious software intrusion is summarized,and the feasibility,security and adaptability of the model are illustrated.
Keywords/Search Tags:Android, Monitor protection model, Fine granular, Controllable permission granularity
PDF Full Text Request
Related items