Android Application Security and Permissions Analysis

碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 101 === With the popularity of smart phones and mobile devices, people pay more attention to the Android system. Inevitably, a large number of attacks and malware accompanied。As the activities on the mobile devices involve a great deal of information, such as...

Full description

Bibliographic Details
Main Authors: LIN JR GANG, 林志剛
Other Authors: 賴槿峰
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/49431475796701707163
id ndltd-TW-101NIU01652004
record_format oai_dc
spelling ndltd-TW-101NIU016520042016-03-23T04:13:16Z http://ndltd.ncl.edu.tw/handle/49431475796701707163 Android Application Security and Permissions Analysis Android應用程式安全與權限分析 LIN JR GANG 林志剛 碩士 國立宜蘭大學 多媒體網路通訊數位學習碩士在職專班 101 With the popularity of smart phones and mobile devices, people pay more attention to the Android system. Inevitably, a large number of attacks and malware accompanied。As the activities on the mobile devices involve a great deal of information, such as e-mail, games and social networks, the malware that steal data threaten the privacy. In the same way, the user’s information may be exposed even the legal application. So users began to consider the system security of mobile devices increasingly.。Due to the characteristics of open source on Android, so the application developer is more and more. There are bad as well as good applications in the Google play because of the lack of the strict review mechanism while uploading the application to Google play. Users only download the applications by high score or developers with good wind assessment passively. However, in addition to the Google Play, many people will download the application from third-party market or unknown web sites. In this case, it is easy to download to the application that is poor quality even damage the system. This paper proposes a filter mechanism that analyzes the permissions and security before installing the application. Then see if there is abnormal behavior through prior run on the Android emulator, and then installed on a physical device, to reduce additional risks and avoid unnecessary waste of money and time. In this paper, verify the security of Google Drive, and found the plain username and password by FTP protocol. Download applications such as App2Card, Onekeyvpn from internet or the third parties market, under the environment that is more secure and closer to the actual environment to analysis Android.ratc, KungFu, so that users can learn how attackers use application for something illegal to avoid to fall into the trap. 賴槿峰 2013 學位論文 ; thesis 65 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 101 === With the popularity of smart phones and mobile devices, people pay more attention to the Android system. Inevitably, a large number of attacks and malware accompanied。As the activities on the mobile devices involve a great deal of information, such as e-mail, games and social networks, the malware that steal data threaten the privacy. In the same way, the user’s information may be exposed even the legal application. So users began to consider the system security of mobile devices increasingly.。Due to the characteristics of open source on Android, so the application developer is more and more. There are bad as well as good applications in the Google play because of the lack of the strict review mechanism while uploading the application to Google play. Users only download the applications by high score or developers with good wind assessment passively. However, in addition to the Google Play, many people will download the application from third-party market or unknown web sites. In this case, it is easy to download to the application that is poor quality even damage the system. This paper proposes a filter mechanism that analyzes the permissions and security before installing the application. Then see if there is abnormal behavior through prior run on the Android emulator, and then installed on a physical device, to reduce additional risks and avoid unnecessary waste of money and time. In this paper, verify the security of Google Drive, and found the plain username and password by FTP protocol. Download applications such as App2Card, Onekeyvpn from internet or the third parties market, under the environment that is more secure and closer to the actual environment to analysis Android.ratc, KungFu, so that users can learn how attackers use application for something illegal to avoid to fall into the trap.
author2 賴槿峰
author_facet 賴槿峰
LIN JR GANG
林志剛
author LIN JR GANG
林志剛
spellingShingle LIN JR GANG
林志剛
Android Application Security and Permissions Analysis
author_sort LIN JR GANG
title Android Application Security and Permissions Analysis
title_short Android Application Security and Permissions Analysis
title_full Android Application Security and Permissions Analysis
title_fullStr Android Application Security and Permissions Analysis
title_full_unstemmed Android Application Security and Permissions Analysis
title_sort android application security and permissions analysis
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/49431475796701707163
work_keys_str_mv AT linjrgang androidapplicationsecurityandpermissionsanalysis
AT línzhìgāng androidapplicationsecurityandpermissionsanalysis
AT linjrgang androidyīngyòngchéngshìānquányǔquánxiànfēnxī
AT línzhìgāng androidyīngyòngchéngshìānquányǔquánxiànfēnxī
_version_ 1718210273098072064