Font Size: a A A

Research On Android Application Security Based On Component Relations

Posted on:2017-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:H ChenFull Text:PDF
GTID:2428330590991564Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile technology,mobile terminals have become increasingly powerful and will gradually replace personal computers as the most popular processing platforms.As the most popular mobile operating system,Android has been applied to various important areas beyond smartphones,including education,medicine,and automation.Android allows users to install a variety of applications to enhance the system,with which users can complete more information interactions.Therefore,Android system is often used to store traditional SMS(Short Message Service),digital address books,and other important and sensitive information.The Android operating system is more vulnerable to malware compared with other systems,such as i OS and Blackberry OS since it is opensource software.Therefore,Android becomes one of the prefered targets of malicious attackers.With a increasing number of malwares appearing,the users of Android get threatened seriously.The detection of malwares and enhancement of Android system have been focused recently.For the detection of malwares,we proposed a new method based on the traditional program analysis.We provide the visual application safety analysis result for the users and let them judge if the application has malicious behavior in terms of the application scenarios.That is the new way to detect malwares by combining program analysis and the recognition of users.Android system is a set of components essentially,so we build a component model to visually describe the behavior of the application.Based on the research of Android framework and the behavior of malwares,we set a series of properties of the components and extract them utilizing the method of regex to complete the component description of the application.To analyze the safety of applications,the most popular methods are to analyze the permission and the privacy data accessed by the application and we use the same method.Different from the traditional way,we study them in the dimension of components and locate the components which access the privacy data,have data exits and exposed to other applications.In this way we describe the safety of the application.We establish the rules of the attack graph composed of components based on the one in the network.With the results of component modeling and safety analysis,we construct an attack graph by matching the components and mark the components related the application safety.Up here we implement the visual description of the application safety.At last,we proved the method of describing the application behavior with a component attack graph correct and implementable.And the experiment shows the method can reveal the difference of the behavior of malwares to implement the detection of malwares.
Keywords/Search Tags:component, attack graph, visualization, Android securiy
PDF Full Text Request
Related items