Android系统漏洞检测和利用方法的研究与实现
[Abstract]:Android operating system is widely used because of its open source characteristics. However, because of the loopholes in the system, the illegal molecules use system vulnerabilities to improve their own application rights, illegally collect or disclose user information under the full unknowable situation of the users, even completely control the event of user equipment. For example, the garbage caused by information leakage. Telephone and text messages make people's normal life harassed and the property loss caused by telecommunications fraud. Therefore, the security of the Android operating system is highly valued. It is of great significance to study the detection and use of Android system vulnerabilities, both in commercial value and in the protection of personal information and property. After analyzing the security mechanism of Android application layer, this paper summarizes the security development test method of Android application. On the basis of studying the security mechanism and the vulnerability buffer mechanism of the Android system level, it summarizes the method of using the vulnerability extraction of the Android 4.1.2-6.0.1 version, and writes the loophole utilization code; in addition, it aims at the current market. In the lack of Android system vulnerability detection software, two vulnerability detection methods based on vulnerability detection and vulnerability number based binary vulnerability detection are proposed. Based on these two methods, a vulnerability detection tool, one VTS.VTS, is designed and implemented to effectively solve the use of traditional PoC and others. The scripting method has the problem of low efficiency, large workload and poor stability in the existence of vulnerability verification. Through the use of loopholes in the system version between the 19 types of 4.1.2-6.0.1 models to carry out root lifting test, it is found that CVE-2014-7911CVE-2014-4322, CVE-2015-3636, and CVE-2015-1805 are used in combination of the code. Root all models. While using only a single vulnerability to use code for weight testing, a large number of model adaptions are required to achieve better results due to hard coding in the vulnerability code. In addition, 93 vulnerability detection codes are added to the vulnerability detection tool, VTS, and several models of the Google official and domestic manufacturers. The test results show that the VTS detection speed is fast and the operation is stable and smooth. The error rate of the test results can be controlled within 10% through the specific code modification to the specific model. It meets the requirements of the domestic manufacturers to detect the vulnerability patch level of the published system regularly and to familiarize the users with the security of their own devices.
【学位授予单位】:西安科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP316;TP309
【参考文献】
相关期刊论文 前10条
1 Yue CHEN;;地址空间布局随机化(ASLR)增强研究综述[J];中国教育网络;2016年08期
2 张嘉元;;一种基于匹配的Android系统漏洞检测方法[J];电信科学;2016年05期
3 蒋克东;;360手机助手推“照妖镜”提升手机安全性[J];计算机与网络;2016年06期
4 郑显义;李文;孟丹;;TrustZone技术的分析与研究[J];计算机学报;2016年09期
5 包依勤;;TrustZone技术在Android系统中的安全性研究[J];物联网技术;2015年10期
6 梁霞;赵晓燕;马春艳;;Linux系统中文件访问控制列表在权限管理中的应用[J];信息技术与信息化;2015年07期
7 姚一楠;翟世俊;;Android平台漏洞及安全威胁研究[J];移动通信;2015年11期
8 潘谈;;基于linux系统文件权限的研究[J];无线互联科技;2014年10期
9 杨超;刘文庆;张伟;陈云芳;;基于利用方式的Android Root漏洞分析[J];计算机科学;2014年S1期
10 杨欢;张玉清;胡予濮;刘奇旭;;基于多类特征的Android应用恶意行为检测系统[J];计算机学报;2014年01期
相关博士学位论文 前1条
1 张源;安卓平台安全性增强关键技术的研究[D];复旦大学;2014年
相关硕士学位论文 前9条
1 陈宏伟;基于关联分析的Android权限滥用攻击检测系统研究[D];中国科学技术大学;2016年
2 李晓洲;Android应用程序组件漏洞测试方法研究[D];太原理工大学;2015年
3 彭凌;Android应用权限检测技术的研究与改进[D];中国科学技术大学;2015年
4 刘昊晨;基于Lua引擎的Android漏洞检测工具研究[D];西安电子科技大学;2015年
5 赵幸;Android平台恶意应用程序行为分析与研究[D];北京交通大学;2014年
6 马诚泽;Android与iOS的对比分析及Android安全技术的设计与实现[D];山东理工大学;2013年
7 汪剑;基于SEAndroid的安全探究及其动态多标签实现[D];电子科技大学;2013年
8 彭智俊;采用静态分析检测Android应用信息泄露的研究[D];复旦大学;2012年
9 金国军;基于安全的Linux内核动态行为研究[D];兰州大学;2012年
,本文编号:2168446
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2168446.html