2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩23頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、本文是中英雙語(yǔ)對(duì)照畢業(yè)設(shè)計(jì)論文外文文獻(xiàn)翻譯,下載之后無(wú)需調(diào)整復(fù)雜的格式直接可用!一輩子也就一次的事!文獻(xiàn)引用作者出處信息:Jinxin Zhang, Xiaohui Yang Tao Li, Jiamin Bao.A DETECTION SYSTEM OF ANDROID APPLICATION BASED ON PERMISSION ANALYSIS[C]. 2018 Communications Security Conferenc

2、e (CSC 2018)(如覺(jué)得年份太老,可改為近 2 年,畢竟很多畢業(yè)生都這樣做)英文 3181 單詞,20964 字符(字符就是印刷符),中文 4896 漢字。 (如果字?jǐn)?shù)多了,可自行刪減,大多數(shù)學(xué)校都是要求選取外文的一部分內(nèi)容進(jìn)行翻譯的。 )A DETECTION SYSTEM OF ANDROID APPLICATION BASED ON PERMISSION ANALYSISKeywords: Android, Securit

3、y Mechanism, Permission DetectionAbstract: Since the openness of Android platform leads to a mess of privacy leaks and property damages of users, a novel detection system based on the permission analysis for Android appl

4、ications (APPs) is proposed. The proposed detection system can be incorporated with computer terminals as well as mobile terminals, and can detect the permission information of APPs and check the sensitive permission the

5、 APPs possess. In addition, the detect system can provide a secondary judgement of APPs to guarantee the information and property security of the users.1Introduction1.1Android security statusAndroid is an open source mob

6、ile operating system developed based on Linux system and introduced by Google and its open handset alliance[1]. Currently, Android has been widely used in mobile phones, tablet PCs, laptops and other smart mobile devices

7、. According to the data report released by market research firm Canalys on May 30, in the first quarter of 2013, the global smart mobile equipment shipments list directly from the Android system settings.Based on the res

8、earch of the Android security mechanisms and the analysis of the potential security problems the above phenomenon may lead to, a system combined with PC and cell phone side is designed and developed in this paper, which

9、can thoroughly detect the permissions informations of the uninstalled Android packages (APK) as well as the installed APP. The proposed system can detect the number of the permissions that the APP software applied for pr

10、ecisely and will show the detailed list of the permissions. By establishing the database, the detection system can give detailed and clear description of each permission and the security problems may be caused by the per

11、mission. It makes normal users who lack of professional knowledge understand the role of the applied APP permissions easily, and raises awareness of the safety of users. In addition, the system can provide users to searc

12、h all the APPs for the ones that use a specific sensitive permission. In this way, the system can assist users to screen out the malicious softwares and protect the security of Android system.2Android specific security m

13、echanismsAndroid system supports multi-platform operation, which uses the version of the kernel of Linux 2.6, and uses Dalvik virtual machine as an APP runtime environment. Android system has a layered architecture[4]. F

14、orm the bottom to the top, there are five layers, which are the Linux kernel, the local library, the Android runtime environment, the APP framework and the APP. During designing and developing the Android operating syste

15、m, Google not only inherits the designing idea of Linux, but also sets a corresponding security mechanism in each layer. Moreover, Google also sets two kinds of Android specific security mechanisms: signature and APP per

16、mission control.2.1Signature mechanismAll Android APPs must have a digital certificate, due to that the system will not install an APP that doesn’t have a digital certificate. Unlike other platforms, Android APP signatur

17、e not only indicates the publisher of the APK, but also provides validation of the integrity and reliability of the program. For those who attempt to tamper with the APK file, the system will force them to re-sign the AP

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論