Android應(yīng)用缺陷分析方法研究
[Abstract]:With the rapid development of mobile Internet technology and the popularity of intelligent terminals in the world, intelligent terminals play an increasingly important role in people's life and work. Users can use their smart terminals to easily do online shopping, mobile phone payments, video chat and other activities. However, as the opening of Android system brings convenience to users, there are also a variety of security problems, such as privacy disclosure, tariff consumption, system damage and so on. These problems not only harm the economic interests of users. Also threatens the user's personal and privacy security. In order to solve the security problem of application software on Android platform, the existing research results mainly focus on the analysis of single application, and use static or dynamic technology to detect the security defects of application software. As we all know, the defects are common, only the security defects are detected, but the trigger conditions are not given, and the protective methods are very limited to the protection of mobile intelligent terminals. In this paper, a new method of security defect analysis for Android application software is proposed. The new idea of combining static detection technology with defect rules meets the needs of Android application defect detection. A defect trigger model is established for each application category, which breaks through the limitation of the traditional method to model the defect itself. Secondly, the corresponding detection system is designed based on this method. The system is developed and deployed, and the system is tested and verified with a lot of data. The main work of this paper is as follows: (1) the present security status of Android platform is studied. This paper introduces the research status of Android application defect detection technology, and makes a deep research on the Android system architecture and security mechanism. (2) A Android application defect analysis method is proposed and its method flow is expounded. Based on the analysis of defect detection and defect trigger, the application of defect detection method, the establishment of defect trigger model and their corresponding principles are introduced respectively. (3) the key technologies of Android application defect analysis are studied. Thus, a general design scheme of defect analysis system based on Android application software is presented, and each subsystem is designed and implemented in detail. (4) the system test flow and verification flow are given. The availability of the system is verified by detecting the function of each module of the system through the running process of the system, and the effectiveness of the system is verified by using the vulnerabilities and attack methods that have been disclosed.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP316;TP309
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 袁萌;;Android計(jì)劃為什么要懸賞1000萬(wàn)[J];信息系統(tǒng)工程;2007年12期
2 林耕宇;;觀摩50名Google Android程序開(kāi)發(fā)競(jìng)賽作品[J];電子與電腦;2008年08期
3 樹(shù)子;;Android中文版不完全體驗(yàn)[J];互聯(lián)網(wǎng)天地;2009年04期
4 Jason Whitmire;;產(chǎn)業(yè)軟件專家如何協(xié)助解決Android的分裂困境[J];電子與電腦;2010年02期
5 蔣彬;;10款A(yù)ndroid手機(jī)必備應(yīng)用——Android操作系下的軟件評(píng)測(cè)[J];微電腦世界;2010年04期
6 ;PCWorld Windows Phone 7挑戰(zhàn)Android 毅然崛起的AndroidⅠ洗心革面的Windows Phone 7[J];微電腦世界;2010年08期
7 韓青;;Android平臺(tái)發(fā)展的動(dòng)力與挑戰(zhàn)[J];中國(guó)電子商情(基礎(chǔ)電子);2010年09期
8 方智勇;;Android手機(jī)這樣用[J];電腦迷;2010年15期
9 缺少浪漫;;Android的另一面[J];電腦迷;2010年13期
10 ;ZTE and Three Release Android ,
本文編號(hào):2154905
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2154905.html