Affiliation:
1. Kunming University of Science and Technology
Abstract
Android platform data security mechanism and security vulnerabilities in android third party software were introduced. In order to eliminate the potential security threat, detection principle of traditional Trojan feature code was improved. A number of steps such as using c/s structure, establishing the Trojan family model on the server, receiving and checking the client's malicious, returning the results to the client, and the client adopting corresponding operation, as to ensure the information security of mobile phone user were researched.
Publisher
Trans Tech Publications, Ltd.
Reference8 articles.
1. Katysovas T. A first look at Google Android[M] : Free University ofBolzano , 2008. 12-26.
2. Enck, William, Ongtang, Machigar, McDaniel, Patrick et al. Understanding Android Security[J]. IEEE security & privacy, 2009, 7(01): 50-57.
3. Burns J. Developing Secure Mobile Applications for Android[R]. Technical Report, iSEC, (2008).
4. Shin, Wook1, Kiyomoto, Shinsaku1, Fukushima, Kazuhide1, Tanaka, Toshiaki. A formal model to analyze the permission authorization andenforcement in the Android framework [J]. IEEE Computer Society (2010).
5. C. Mulliner, G. Vigna, D. Dagon, W. Lee. Using labeling to prevent cross-service attacks against smartphones[J]. In DIMVA, (2006).