Android Application Security and Permissions Analysis

碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 101 === With the popularity of smart phones and mobile devices, people pay more attention to the Android system. Inevitably, a large number of attacks and malware accompanied。As the activities on the mobile devices involve a great deal of information, such as...

Full description

Bibliographic Details
Main Authors: LIN JR GANG, 林志剛
Other Authors: 賴槿峰
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/49431475796701707163
Description
Summary:碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 101 === With the popularity of smart phones and mobile devices, people pay more attention to the Android system. Inevitably, a large number of attacks and malware accompanied。As the activities on the mobile devices involve a great deal of information, such as e-mail, games and social networks, the malware that steal data threaten the privacy. In the same way, the user’s information may be exposed even the legal application. So users began to consider the system security of mobile devices increasingly.。Due to the characteristics of open source on Android, so the application developer is more and more. There are bad as well as good applications in the Google play because of the lack of the strict review mechanism while uploading the application to Google play. Users only download the applications by high score or developers with good wind assessment passively. However, in addition to the Google Play, many people will download the application from third-party market or unknown web sites. In this case, it is easy to download to the application that is poor quality even damage the system. This paper proposes a filter mechanism that analyzes the permissions and security before installing the application. Then see if there is abnormal behavior through prior run on the Android emulator, and then installed on a physical device, to reduce additional risks and avoid unnecessary waste of money and time. In this paper, verify the security of Google Drive, and found the plain username and password by FTP protocol. Download applications such as App2Card, Onekeyvpn from internet or the third parties market, under the environment that is more secure and closer to the actual environment to analysis Android.ratc, KungFu, so that users can learn how attackers use application for something illegal to avoid to fall into the trap.