Android系統(tǒng)漏洞檢測(cè)和利用方法的研究與實(shí)現(xiàn)
[Abstract]:Android operating system is widely used because of its open source characteristics. However, because of the loopholes in the system, the illegal molecules use system vulnerabilities to improve their own application rights, illegally collect or disclose user information under the full unknowable situation of the users, even completely control the event of user equipment. For example, the garbage caused by information leakage. Telephone and text messages make people's normal life harassed and the property loss caused by telecommunications fraud. Therefore, the security of the Android operating system is highly valued. It is of great significance to study the detection and use of Android system vulnerabilities, both in commercial value and in the protection of personal information and property. After analyzing the security mechanism of Android application layer, this paper summarizes the security development test method of Android application. On the basis of studying the security mechanism and the vulnerability buffer mechanism of the Android system level, it summarizes the method of using the vulnerability extraction of the Android 4.1.2-6.0.1 version, and writes the loophole utilization code; in addition, it aims at the current market. In the lack of Android system vulnerability detection software, two vulnerability detection methods based on vulnerability detection and vulnerability number based binary vulnerability detection are proposed. Based on these two methods, a vulnerability detection tool, one VTS.VTS, is designed and implemented to effectively solve the use of traditional PoC and others. The scripting method has the problem of low efficiency, large workload and poor stability in the existence of vulnerability verification. Through the use of loopholes in the system version between the 19 types of 4.1.2-6.0.1 models to carry out root lifting test, it is found that CVE-2014-7911CVE-2014-4322, CVE-2015-3636, and CVE-2015-1805 are used in combination of the code. Root all models. While using only a single vulnerability to use code for weight testing, a large number of model adaptions are required to achieve better results due to hard coding in the vulnerability code. In addition, 93 vulnerability detection codes are added to the vulnerability detection tool, VTS, and several models of the Google official and domestic manufacturers. The test results show that the VTS detection speed is fast and the operation is stable and smooth. The error rate of the test results can be controlled within 10% through the specific code modification to the specific model. It meets the requirements of the domestic manufacturers to detect the vulnerability patch level of the published system regularly and to familiarize the users with the security of their own devices.
【學(xué)位授予單位】:西安科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP316;TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 Yue CHEN;;地址空間布局隨機(jī)化(ASLR)增強(qiáng)研究綜述[J];中國(guó)教育網(wǎng)絡(luò);2016年08期
2 張嘉元;;一種基于匹配的Android系統(tǒng)漏洞檢測(cè)方法[J];電信科學(xué);2016年05期
3 蔣克東;;360手機(jī)助手推“照妖鏡”提升手機(jī)安全性[J];計(jì)算機(jī)與網(wǎng)絡(luò);2016年06期
4 鄭顯義;李文;孟丹;;TrustZone技術(shù)的分析與研究[J];計(jì)算機(jī)學(xué)報(bào);2016年09期
5 包依勤;;TrustZone技術(shù)在Android系統(tǒng)中的安全性研究[J];物聯(lián)網(wǎng)技術(shù);2015年10期
6 梁霞;趙曉燕;馬春艷;;Linux系統(tǒng)中文件訪問(wèn)控制列表在權(quán)限管理中的應(yīng)用[J];信息技術(shù)與信息化;2015年07期
7 姚一楠;翟世俊;;Android平臺(tái)漏洞及安全威脅研究[J];移動(dòng)通信;2015年11期
8 潘談;;基于linux系統(tǒng)文件權(quán)限的研究[J];無(wú)線互聯(lián)科技;2014年10期
9 楊超;劉文慶;張偉;陳云芳;;基于利用方式的Android Root漏洞分析[J];計(jì)算機(jī)科學(xué);2014年S1期
10 楊歡;張玉清;胡予濮;劉奇旭;;基于多類(lèi)特征的Android應(yīng)用惡意行為檢測(cè)系統(tǒng)[J];計(jì)算機(jī)學(xué)報(bào);2014年01期
相關(guān)博士學(xué)位論文 前1條
1 張?jiān)?安卓平臺(tái)安全性增強(qiáng)關(guān)鍵技術(shù)的研究[D];復(fù)旦大學(xué);2014年
相關(guān)碩士學(xué)位論文 前9條
1 陳宏偉;基于關(guān)聯(lián)分析的Android權(quán)限濫用攻擊檢測(cè)系統(tǒng)研究[D];中國(guó)科學(xué)技術(shù)大學(xué);2016年
2 李曉洲;Android應(yīng)用程序組件漏洞測(cè)試方法研究[D];太原理工大學(xué);2015年
3 彭凌;Android應(yīng)用權(quán)限檢測(cè)技術(shù)的研究與改進(jìn)[D];中國(guó)科學(xué)技術(shù)大學(xué);2015年
4 劉昊晨;基于Lua引擎的Android漏洞檢測(cè)工具研究[D];西安電子科技大學(xué);2015年
5 趙幸;Android平臺(tái)惡意應(yīng)用程序行為分析與研究[D];北京交通大學(xué);2014年
6 馬誠(chéng)澤;Android與iOS的對(duì)比分析及Android安全技術(shù)的設(shè)計(jì)與實(shí)現(xiàn)[D];山東理工大學(xué);2013年
7 汪劍;基于SEAndroid的安全探究及其動(dòng)態(tài)多標(biāo)簽實(shí)現(xiàn)[D];電子科技大學(xué);2013年
8 彭智俊;采用靜態(tài)分析檢測(cè)Android應(yīng)用信息泄露的研究[D];復(fù)旦大學(xué);2012年
9 金國(guó)軍;基于安全的Linux內(nèi)核動(dòng)態(tài)行為研究[D];蘭州大學(xué);2012年
,本文編號(hào):2168446
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2168446.html