Font Size: a A A

The Research Of Application Protection Strategy On Android System

Posted on:2018-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:D H LiuFull Text:PDF
GTID:2428330590977702Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the vigorous development of the mobile Internet,smart terminal devices are more and more popular.Because of its characteristics of openness,Google's Android operation system attract a lot of application developers,and become the largest mobile terminal operation platform now.However,it is because of its characteristics of openness,Android applications suffer from malicious cracking frequently,and all kinds of piracy application come endlessly,which result in great potential safety hazard to both users and developers.This paper firstly studies all five layers of the Android system architecture model,SELinux and SEAndroid,three major security mechanism in Android system,and then studies the generation process of Android applications and its package file structure.After that we analyse the main methods of hacking attack from attacker.By studying of the crack means,this paper puts forward the corresponding protection strategy of the application,including: code confusion,signature verification,NDK reinforcement,APK shelling,dynamic loading dex file,.so file deformation,against network hijack and so on.Based on the various protection strategy,this paper proposes a protection strategy to prevent malicious attacks,including encrypted signature validation,dex file memory loading,anti-debugging,against network hijack,against reverse tool,NDK reinforcement and so on.By reinforcing from different levels,this strategy can protect of source code of Android program in a certain degree.At the end of this article,according to the reinforcement strategy,the author do some corresponding experiments and expound it in the whole and each model view.In the end,the author validate it in a reverse degree.Through the contrast of the experiment,we find that the strategy can do good deals with the current means of attack,which can protect the source code efficiently.
Keywords/Search Tags:Android, Reverse Engineering, Dynamic Loading, Software Protection
PDF Full Text Request
Related items