LC1860智能操作系統(tǒng)安全增強(qiáng)機(jī)制的設(shè)計(jì)與實(shí)現(xiàn)
本文關(guān)鍵詞: 安卓系統(tǒng) 安全性 認(rèn)證機(jī)制 防火墻策略 MD5加密校驗(yàn) 出處:《山東大學(xué)》2017年碩士論文 論文類型:學(xué)位論文
【摘要】:自從進(jìn)入二十一世紀(jì)以來,智能手機(jī)得到了快速的發(fā)展,這離不開科學(xué)與技術(shù)的進(jìn)步,離不開研究人員,技術(shù)人員的辛勤勞動,搭載于智能終端之上的操作系統(tǒng)占據(jù)著非常重要的地位,而其中的安卓系統(tǒng)作為一個(gè)開源操作系統(tǒng),自從其2007年誕生以來因其開源特性與良好的可擴(kuò)展性吸引著越來越多的開發(fā)者以及智能終端廠商加入到這個(gè)打陣營之中,安卓系統(tǒng)逐漸占據(jù)了在智能手機(jī)和平板電腦領(lǐng)域的市場份額。對于智能終端廠商而言,安卓系統(tǒng)的開源性使其能夠定制自己期望的操作系統(tǒng),不僅僅能夠定制自己的UI,還可以優(yōu)化系統(tǒng),發(fā)揮更好的性能,提供自己的操作系統(tǒng)特性。任何的計(jì)算機(jī)系統(tǒng),無論是系統(tǒng)軟件層面,還是應(yīng)用軟件層面,系統(tǒng)的安全都是一個(gè)非常重要的要考慮的因素,而操作系統(tǒng)作為其他應(yīng)用運(yùn)行的平臺,其安全機(jī)制的重要性更是毋庸多言。所以說在廠商在定制自己操作系統(tǒng)的過程中,操作系統(tǒng)的安全機(jī)制是其考慮的重中之重,構(gòu)建一個(gè)安全的操作系統(tǒng)是定制操作系統(tǒng)的基礎(chǔ)。本文借鑒安卓源碼實(shí)現(xiàn)加固操作系統(tǒng)增強(qiáng)安全機(jī)制,核心模塊是驅(qū)動的認(rèn)證機(jī)制、應(yīng)用的認(rèn)證機(jī)制、精細(xì)化的網(wǎng)絡(luò)防火墻策略機(jī)制以及一個(gè)配套的配置文件生成工具的實(shí)現(xiàn),驅(qū)動認(rèn)證保證HAL層驅(qū)動加載的安全,應(yīng)用認(rèn)證保證應(yīng)用運(yùn)行與安裝的安全,防火墻策略保證網(wǎng)絡(luò)環(huán)境下的安全,在討論認(rèn)證實(shí)現(xiàn)的背景和對其開發(fā)設(shè)計(jì)所面對問題的基礎(chǔ)上,對該系統(tǒng)所需要的功能需求和非功能性需求進(jìn)行調(diào)研與認(rèn)真分析,并對該系統(tǒng)的需求實(shí)現(xiàn)使用各種圖例來進(jìn)行詳細(xì)的說明。在分析出需求分析之后,架構(gòu)設(shè)計(jì)便是接下來的步驟。進(jìn)一步進(jìn)行了對該系統(tǒng)實(shí)現(xiàn)的詳細(xì)設(shè)計(jì)。根據(jù)系統(tǒng)的功能需求進(jìn)行分析得出的安全性,可靠性以及穩(wěn)定性方面的需求分別進(jìn)行了不同模塊的設(shè)計(jì)。這些模塊等既有自己的功能,又能互相協(xié)作整體提升系統(tǒng)的各個(gè)性能。通過對系統(tǒng)的詳細(xì)設(shè)計(jì),制定出了系統(tǒng)的整體效果圖和各個(gè)部分的實(shí)現(xiàn)。最后,該文對加固系統(tǒng)的增強(qiáng)安全機(jī)制的應(yīng)用效果從性能,功能,穩(wěn)定等方面進(jìn)行了測試,并對該系統(tǒng)的實(shí)現(xiàn)提出了進(jìn)一步的改進(jìn)意見。
[Abstract]:Since 21th century, smart phones have been developing rapidly, which is inseparable from the progress of science and technology, and the hard work of researchers and technicians. The operating system on top of the smart terminal occupies a very important position, and the Android operating system is an open source operating system. Since its inception in 2007, its open source features and good scalability have attracted more and more developers and smart terminal vendors to join the camp. Android is gaining market share in smartphones and tablets. For smartphone makers, Android's open-source nature allows it to customize its desired operating system. Not only can you customize your own UIs, but you can also optimize your system, perform better performance, and provide your operating system features. Any computer system, whether at the system software level or at the application software level, The security of the system is a very important factor to consider, and the security mechanism of the operating system, as a platform for other applications to run, is even more important. Therefore, in the process of customizing the operating system, The security mechanism of the operating system is the most important consideration, and the construction of a secure operating system is the basis of the customized operating system. This paper uses the Android source code to strengthen the security mechanism of the operating system, and the core module is the driver authentication mechanism. The application authentication mechanism, the detailed network firewall policy mechanism and the implementation of a matching configuration file generation tool, the driver authentication guarantees the HAL layer driver loading security, the application authentication guarantees the application operation and the installation security, the application authentication guarantees the application operation and the installation security, the driver authentication guarantees the HAL layer driver loading security, The firewall strategy ensures the security in the network environment. On the basis of discussing the background of authentication implementation and the problems faced by the development and design of the firewall, the functional and non-functional requirements of the system are investigated and analyzed. And use various legends to explain the requirement realization of the system in detail. After analyzing the requirement analysis, Architecture design is the next step. Further, the detailed design of the system is carried out. According to the functional requirements of the system, the security of the system is analyzed. The requirements of reliability and stability are designed for different modules. These modules have their own functions, and they can cooperate with each other to improve the performance of the system as a whole. The overall effect of the system and the implementation of each part are worked out. Finally, the application effect of the reinforcement system is tested in terms of performance, function, stability and so on. Further improvement suggestions are put forward for the realization of the system.
【學(xué)位授予單位】:山東大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP311.52;TP316
【參考文獻(xiàn)】
相關(guān)期刊論文 前6條
1 張?zhí)K穎;;基于Android系統(tǒng)的手機(jī)防火墻的設(shè)計(jì)及實(shí)現(xiàn)研究[J];信息與電腦(理論版);2012年12期
2 蔣紹林;王金雙;張濤;陳融;;Android安全研究綜述[J];計(jì)算機(jī)應(yīng)用與軟件;2012年10期
3 康海燕;陳然;苑曉姣;李清華;;基于Android防火墻日志系統(tǒng)的研究與實(shí)現(xiàn)[J];北京信息科技大學(xué)學(xué)報(bào)(自然科學(xué)版);2012年04期
4 徐娟娟;李玲玲;;基于Netfilter的防火墻原理分析[J];黑龍江科技信息;2011年15期
5 李正平;徐超;陳軍寧;代廣珍;;Linux2.6內(nèi)核設(shè)備模型分析[J];計(jì)算機(jī)技術(shù)與發(fā)展;2007年03期
6 劉勝國;劉雁林;;基于Triple DES和RSA的二進(jìn)制文件加密[J];成都信息工程學(xué)院學(xué)報(bào);2006年01期
相關(guān)碩士學(xué)位論文 前4條
1 王闖;基于STM32系列ARM Gortex-M3微控制器的微型熱敏打印機(jī)固件開發(fā)[D];山東大學(xué);2015年
2 劉磊;Android安全體系的分析[D];廣東工業(yè)大學(xué);2013年
3 李密;基于RSYNC算法的CDP數(shù)據(jù)備份研究[D];華北電力大學(xué);2013年
4 陸琳琳;MD5算法的技術(shù)研究及性能優(yōu)化[D];吉林大學(xué);2006年
,本文編號:1508547
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/1508547.html