摘 要随着移动互联网行业的迅猛发展,Android智能手机已经迅速普及,Android系统上的App更是呈爆发式地增长。市场上流行的App已经涵盖了人们的衣食住行等方方面面,然而数量如此庞大的App也给人们的生活带来了很大的隐患。越来越多的恶意软件在市场上肆意横行,这些恶意软件通常会有私自发送扣费短信、消耗用户流量等恶意行为,对用户的利益造成了巨大的损失。
越来越多的用户希望能有一个安全有效的系统来保护他们手机的安全,特别是手机上App的安全,本文正是基于这样一个背景下,对Android系统App的安全性检测进行了研究,根据需求分析设计并实现了一个安卓App安全性测试系统。87198
本文设计的系统完成了两大功能,分别是安卓App的安全性测试和手机敏感行为的监控,在一定程度上满足了社会需求,对以后的研究也有一定的指导意义。系统采用了C/S架构,包括Android软件和Web服务器。论文详细叙述了系统的开发流程,最终完成了开发和测试,并给出了运行效果图。
毕业论文关键词:安卓权限检测,App安全性,安卓手机监控
Abstract With the rapid development of the Internet industry, Android smartphone has quickly spread, the number of App on the Android system has a more explosive growth speed。 Popular App on the market has covered all aspects of people's basic necessities, but such a large number of App also gives people's lives a great deal of distress。 More and more malicious software on the market running amok, these malicious software often have malicious behavior such as send deductions text messages secretly, and consume user traffic, which has caused tremendous losses to the interests of users。
More and more users want to have a safe and effective systems to protect their cell phone safety, especially the safety of the phone App, this paper is based on such a background, for safety testing of Android App system were studied, according to the needs analysis and design and implementation of an Android App security testing system。
This system has completed two main functions, which is security testing of Android App and monitoring of sensitive behavior, to a certain extent to meet the social needs and also has some significance for future research。 The system uses the C / S architecture, including Android software and web servers。 Paper described in detail the system development process, the final completion of development and testing, and gives the run renderings。
Keywords: Android Permission Detection, App Security, Android Phone Monitoring
目 录
第一章 绪论 1
1。1 引言 1
1。2 研究目标和内容 1
1。3 论文结构 2
第二章 可行性研究 3
2。1 相关技术介绍 3
2。2 Android系统的安全机制 6
2。3 Android系统的Binder通信机制 6
2。4 Android软件敏感行为的监控技术 7
第三章 需求分析 9
3。1 市场需求 9
3。2 功能需求 9
3。3 运行需求 11
第四章 系统设计 12
4。1 系统目标