Android系統(tǒng)漏洞檢測和利用方法的研究與實現(xiàn)
[Abstract]:Android operating system is widely used because of its open source characteristics. However, because of the loopholes in the system, the illegal molecules use system vulnerabilities to improve their own application rights, illegally collect or disclose user information under the full unknowable situation of the users, even completely control the event of user equipment. For example, the garbage caused by information leakage. Telephone and text messages make people's normal life harassed and the property loss caused by telecommunications fraud. Therefore, the security of the Android operating system is highly valued. It is of great significance to study the detection and use of Android system vulnerabilities, both in commercial value and in the protection of personal information and property. After analyzing the security mechanism of Android application layer, this paper summarizes the security development test method of Android application. On the basis of studying the security mechanism and the vulnerability buffer mechanism of the Android system level, it summarizes the method of using the vulnerability extraction of the Android 4.1.2-6.0.1 version, and writes the loophole utilization code; in addition, it aims at the current market. In the lack of Android system vulnerability detection software, two vulnerability detection methods based on vulnerability detection and vulnerability number based binary vulnerability detection are proposed. Based on these two methods, a vulnerability detection tool, one VTS.VTS, is designed and implemented to effectively solve the use of traditional PoC and others. The scripting method has the problem of low efficiency, large workload and poor stability in the existence of vulnerability verification. Through the use of loopholes in the system version between the 19 types of 4.1.2-6.0.1 models to carry out root lifting test, it is found that CVE-2014-7911CVE-2014-4322, CVE-2015-3636, and CVE-2015-1805 are used in combination of the code. Root all models. While using only a single vulnerability to use code for weight testing, a large number of model adaptions are required to achieve better results due to hard coding in the vulnerability code. In addition, 93 vulnerability detection codes are added to the vulnerability detection tool, VTS, and several models of the Google official and domestic manufacturers. The test results show that the VTS detection speed is fast and the operation is stable and smooth. The error rate of the test results can be controlled within 10% through the specific code modification to the specific model. It meets the requirements of the domestic manufacturers to detect the vulnerability patch level of the published system regularly and to familiarize the users with the security of their own devices.
【學位授予單位】:西安科技大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP316;TP309
【參考文獻】
相關期刊論文 前10條
1 Yue CHEN;;地址空間布局隨機化(ASLR)增強研究綜述[J];中國教育網(wǎng)絡;2016年08期
2 張嘉元;;一種基于匹配的Android系統(tǒng)漏洞檢測方法[J];電信科學;2016年05期
3 蔣克東;;360手機助手推“照妖鏡”提升手機安全性[J];計算機與網(wǎng)絡;2016年06期
4 鄭顯義;李文;孟丹;;TrustZone技術的分析與研究[J];計算機學報;2016年09期
5 包依勤;;TrustZone技術在Android系統(tǒng)中的安全性研究[J];物聯(lián)網(wǎng)技術;2015年10期
6 梁霞;趙曉燕;馬春艷;;Linux系統(tǒng)中文件訪問控制列表在權限管理中的應用[J];信息技術與信息化;2015年07期
7 姚一楠;翟世俊;;Android平臺漏洞及安全威脅研究[J];移動通信;2015年11期
8 潘談;;基于linux系統(tǒng)文件權限的研究[J];無線互聯(lián)科技;2014年10期
9 楊超;劉文慶;張偉;陳云芳;;基于利用方式的Android Root漏洞分析[J];計算機科學;2014年S1期
10 楊歡;張玉清;胡予濮;劉奇旭;;基于多類特征的Android應用惡意行為檢測系統(tǒng)[J];計算機學報;2014年01期
相關博士學位論文 前1條
1 張源;安卓平臺安全性增強關鍵技術的研究[D];復旦大學;2014年
相關碩士學位論文 前9條
1 陳宏偉;基于關聯(lián)分析的Android權限濫用攻擊檢測系統(tǒng)研究[D];中國科學技術大學;2016年
2 李曉洲;Android應用程序組件漏洞測試方法研究[D];太原理工大學;2015年
3 彭凌;Android應用權限檢測技術的研究與改進[D];中國科學技術大學;2015年
4 劉昊晨;基于Lua引擎的Android漏洞檢測工具研究[D];西安電子科技大學;2015年
5 趙幸;Android平臺惡意應用程序行為分析與研究[D];北京交通大學;2014年
6 馬誠澤;Android與iOS的對比分析及Android安全技術的設計與實現(xiàn)[D];山東理工大學;2013年
7 汪劍;基于SEAndroid的安全探究及其動態(tài)多標簽實現(xiàn)[D];電子科技大學;2013年
8 彭智俊;采用靜態(tài)分析檢測Android應用信息泄露的研究[D];復旦大學;2012年
9 金國軍;基于安全的Linux內核動態(tài)行為研究[D];蘭州大學;2012年
,本文編號:2168446
本文鏈接:http://www.sikaile.net/kejilunwen/ruanjiangongchenglunwen/2168446.html