| Recently, with the innovation of communication technology, Mobile Internet is spreading all around the world, and every aspect of human life is changing fast in the times of mobile internet. But under the prosperity, there is a deep threat hiding in the back.Mobile Internet Software act as the medium which is in charge of information exchanging of mobile internet.It also faces the security problem as with software in traditional PC platform. Problems such as privacy theft, malicious service, hooliganism, fraud consumption, system disruption or malicious spreading, are causing great harm to mobile internet software and people’s physical, mental and property. Therefore, to make mobile software get rid of those problems with security techniques is becoming very meaningful.Aiming at those problems, this paper mainly focus on applications security threat on Android platform, since its market shares are more than50percent. Firstly, we do the research on current Android applications protecting techniques, analyse both static protection and dynamic protection technology. Based on these studies, we do deep research on dynamic protection and resources protection which are the current weak aspects in security technologies.In the aspect of dynamic protection, there are two branches, which are anti-emulator and anti-debug technologies. The first one is used to detecting the android application’s running environment, then make the judgement that whether the environment is android emulator or not. If the result of the judgement is YES, the application is very likely on the analysis of attackers. And the latter one mainly focus on whether system environment has debug process, or whether there is some malicious process attaching the android application process. The manuscript dissect the weakness on these two aspects, then we presents a new technique for detecting Android emulator and a new technique for anti-debug based on the Linux function Ptrace.In the aspect of resources protection, firstly we also analyse the current protection’s weakness, then due to features of the resource files’ distributing widely, different sizes. The papaer presents a new encryption technique based on dynamic encryption key.At last, designed and implemented these protection techniques based on the scheme above, then analyzed the correctness of our techniques, and performance cost. Experimental results show that our theoretical hypothesis is right, and these could be served as a complement to existing technology. |