Android智能手機(jī)木馬的研究與實現(xiàn)分析
發(fā)布時間:2018-03-20 10:17
本文選題:手機(jī)木馬 切入點:后臺監(jiān)聽 出處:《電子科技大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:隨著Android智能手機(jī)的大量普及和廣泛應(yīng)用,針對Android智能手機(jī)的惡意軟件也越來越多。其主要危害是:惡意扣費、竊取用戶隱私、惡意欺詐等等。因此我們關(guān)注Android智能手機(jī)的安全性。研究和分析Android智能手機(jī)木馬,為Android智能手機(jī)的惡意軟件檢測提供相應(yīng)的技術(shù)支持,具有良好的科研意義和廣闊的市場價值。本文研究和分析了Android智能手機(jī)木馬現(xiàn)有的植入技術(shù),并且分析了獲取手機(jī)root權(quán)限的基本原理和實現(xiàn)方法。同時也研究了手機(jī)木馬隱藏的基本原理和實現(xiàn)方法。通過對Android平臺的廣播接收器模型的研究,分析了手機(jī)木馬的后臺監(jiān)聽原理和實現(xiàn)技術(shù),為本文的木馬后臺監(jiān)聽的程序?qū)崿F(xiàn)提供了理論基礎(chǔ)和技術(shù)支持。通過對信息截取和回傳技術(shù)的研究與分析,為本文木馬的實現(xiàn)提供技術(shù)支持。通過對Android智能手機(jī)木馬現(xiàn)有技術(shù)的研究和分析,本文實現(xiàn)了一種Android智能手機(jī)木馬,分析了該木馬的整體結(jié)構(gòu)和運行流程,并且詳細(xì)地分析了在Android智能手機(jī)的后臺隱秘地獲取用戶的短信、通話記錄、聯(lián)系人信息和設(shè)備信息的實現(xiàn)原理與方法。本文的意義是通過研究和分析Android智能手機(jī)木馬的現(xiàn)有技術(shù),分析了一種Android智能手機(jī)木馬的實現(xiàn)原理與方法,為Android智能手機(jī)的惡意軟件檢測提供相應(yīng)的技術(shù)支持。
[Abstract]:With the popularity and wide application of Android smartphones, more and more malware is used against Android smartphones. Therefore, we pay attention to the security of Android smart phone, research and analyze the Android smart phone Trojan, and provide the corresponding technical support for the malware detection of Android smart phone. It has good scientific research significance and broad market value. This paper studies and analyzes the existing implantation technology of Android smart phone Trojan horse. At the same time, it also studies the basic principle and implementation method of mobile Trojan horse hiding. Through the research on the broadcast receiver model of Android platform, the paper analyzes the basic principle and implementation method of obtaining the mobile phone root permission, and also studies the basic principle and implementation method of mobile phone Trojan horse hiding. This paper analyzes the background monitoring principle and implementation technology of mobile phone Trojan horse, which provides a theoretical basis and technical support for the implementation of background monitoring program of this paper. Through the research and analysis of information interception and return transmission technology, Through the research and analysis of the existing technology of the Android smart phone Trojan, this paper implements a Android smart phone Trojan, and analyzes the overall structure and running process of the Trojan. And analyzed in detail in the background of the Android smart phone secretly access users of short messages, phone records, The significance of this paper is to study and analyze the existing technology of Android smart phone Trojan, and analyze the realization principle and method of a kind of Android smart phone Trojan. Provides the corresponding technical support for the Android smartphone malware detection.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP309;TN929.53
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 孫潤康;戴茜;溫少鑫;;基于Android手機(jī)錄音木馬的原理分析與實現(xiàn)[J];計算機(jī)光盤軟件與應(yīng)用;2012年15期
2 耿東久;索岳;陳渝;文軍;呂勇強(qiáng);;基于Android手機(jī)的遠(yuǎn)程訪問和控制系統(tǒng)[J];計算機(jī)應(yīng)用;2011年02期
相關(guān)碩士學(xué)位論文 前1條
1 佟得天;基于行為分析的Android手機(jī)木馬檢測技術(shù)研究[D];中山大學(xué);2012年
,本文編號:1638641
本文鏈接:http://sikaile.net/kejilunwen/wltx/1638641.html
最近更新
教材專著