Android系统漏洞检测和利用方法的研究与实现
[Abstract]:The Android operating system is widely used because of its open source characteristics. However, because of the flaw in the system, the lawless elements take advantage of the system vulnerability to enhance their application rights and illegally collect or disclose user information without the user's knowledge. Events that even take full control of the user's equipment occur from time to time. For example, spamming phone calls and text messages caused by information leaks harass people's normal lives, and damage to property caused by telecom fraud. Therefore, the security of the Android operating system has received great attention. It is of great significance to study the detection and utilization of Android system vulnerabilities, whether in commercial value or in the protection of personal information and property. By analyzing the security mechanism of Android application layer, this paper summarizes the security development and testing methods of Android application, and studies the security mechanism and vulnerability buffer mechanism of Android system. This paper summarizes the methods of vulnerability exploitation between version 4.1.2-6.0.1 of Android, and compiles the code of vulnerability exploitation. In addition, aiming at the lack of application software for vulnerability detection of Android system in the current market, Two vulnerability detection methods are proposed, which are vulnerability detection method based on vulnerability characteristics and binary vulnerability detection method based on vulnerability number. Based on these two methods, a vulnerability detection tool, VTS.VTS, is designed and implemented to effectively solve the problems of low efficiency, heavy workload and poor stability when using traditional PoC and other scripting methods to verify vulnerability existence. By testing the vulnerability exploitation code of 19 models with system version between 4.1.2-6.0.1, it is found that CVE-2014-7911CVE-2014-4322CVE-2015-3636 CVE-2015-1805 can be used by all root models. However, when only using a single vulnerability code for power raising testing, due to the existence of hard coding in the vulnerability exploitation code, a large number of adaptations are needed in order to achieve better results. In addition, 93 vulnerability detection codes were added to the vulnerability detection tool VTS, and tested on several models of Google official and domestic manufacturers. The test results show that the VTS detection speed is fast and the operation is stable and smooth. The error rate of the test results can be controlled within 10% by making specific code modification. It meets the requirements of domestic manufacturers to check the vulnerability level of the issued system regularly and users are familiar with the security of their own equipment.
【学位授予单位】:西安科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP316;TP309
【参考文献】
相关期刊论文 前10条
1 Yue CHEN;;地址空间布局随机化(ASLR)增强研究综述[J];中国教育网络;2016年08期
2 张嘉元;;一种基于匹配的Android系统漏洞检测方法[J];电信科学;2016年05期
3 蒋克东;;360手机助手推“照妖镜”提升手机安全性[J];计算机与网络;2016年06期
4 郑显义;李文;孟丹;;TrustZone技术的分析与研究[J];计算机学报;2016年09期
5 包依勤;;TrustZone技术在Android系统中的安全性研究[J];物联网技术;2015年10期
6 梁霞;赵晓燕;马春艳;;Linux系统中文件访问控制列表在权限管理中的应用[J];信息技术与信息化;2015年07期
7 姚一楠;翟世俊;;Android平台漏洞及安全威胁研究[J];移动通信;2015年11期
8 潘谈;;基于linux系统文件权限的研究[J];无线互联科技;2014年10期
9 杨超;刘文庆;张伟;陈云芳;;基于利用方式的Android Root漏洞分析[J];计算机科学;2014年S1期
10 杨欢;张玉清;胡予濮;刘奇旭;;基于多类特征的Android应用恶意行为检测系统[J];计算机学报;2014年01期
相关博士学位论文 前1条
1 张源;安卓平台安全性增强关键技术的研究[D];复旦大学;2014年
相关硕士学位论文 前9条
1 陈宏伟;基于关联分析的Android权限滥用攻击检测系统研究[D];中国科学技术大学;2016年
2 李晓洲;Android应用程序组件漏洞测试方法研究[D];太原理工大学;2015年
3 彭凌;Android应用权限检测技术的研究与改进[D];中国科学技术大学;2015年
4 刘昊晨;基于Lua引擎的Android漏洞检测工具研究[D];西安电子科技大学;2015年
5 赵幸;Android平台恶意应用程序行为分析与研究[D];北京交通大学;2014年
6 马诚泽;Android与iOS的对比分析及Android安全技术的设计与实现[D];山东理工大学;2013年
7 汪剑;基于SEAndroid的安全探究及其动态多标签实现[D];电子科技大学;2013年
8 彭智俊;采用静态分析检测Android应用信息泄露的研究[D];复旦大学;2012年
9 金国军;基于安全的Linux内核动态行为研究[D];兰州大学;2012年
,本文编号:2168445
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2168445.html