期刊文献+

Android操作系统的安全性分析 被引量:48

Analysis the Security of Android
下载PDF
导出
摘要 Android操作系统是一个比较流行的移动终端操作系统,目前Android4.0版本已经发布。为了说明问题,文章基于2.6.25内核版本,对Android的安全性进行了分析。文章的分析从Android与Linux的主要不同之处入手,指出了其面临的主要安全威胁,进而从Android安全模型、安全体系结构、系统实现和安全策略等方面提出了对其进行深入安全分析的方法。 Android is one of the most popular mobile OS and Android 4.0 version has been released resently In this paper, the security of Android 2.6.25 is analyzed .By comparing the differences of Android and Linux the main threads of Android arc pointed out, and the security analysis methods based on Android security model secrity architecture,enplementation and security policies are proposed.
作者 丁丽萍
出处 《信息网络安全》 2012年第3期28-31,41,共5页 Netinfo Security
关键词 ANDROID 操作系统 安全性 分析 android OS security analysis
  • 相关文献

参考文献18

  • 1Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M.Privilege escalation attacks on android[J]. Information Security. 346-360.
  • 2Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y. and Dolev, S. Google Android: A state-of-the-art review of security mechanisms[J]. Arxiv preprmt arXiv:0912.5101.
  • 3ENCK, W., ONGTANG, M., AND MCDANIEL, P. 2009b. Understanding Android Security[J]. IEEE Security and Privacy, 7(01):50-57.
  • 4Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C.Google Android: A comprehensive security assessment[J]. Security & Privacy, IEEE, 8 (02). 35-44.
  • 5Chandhuri, A. Language-based security on Android[C]. Proceedings of the ACM SIGPLAN Fourth Workshop on Progrmnming Languages and Analysis for Security, 2009, 1-7.
  • 6C .Enrique Ortiz.理解Android上的安全性:利用沙箱、应用程序签名和权限增强应用程序安全性[EB/OL]. http://www.ibm.com/developerworks/cn/xml/x-androidsecurity/index.html, 2010 -12 -13.
  • 7Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performance of Network Covert Timing Channel through Huffman Coding[C]. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applicafom for Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.
  • 8Jingzheng Wu, Yongji Wang, Liping Ding, Yanping Zhang. Constructing Scenario of Event-Flag Covert Channel in Secure Operating System[C]. 2rid International Conference on Information and Multimedia Technology (ICIMT 2010). Hongkong. Dec 28-30, 2010.
  • 9Tian Shuo, He Yeping, Ding Liping. A Countermeasure against Stack-smashing Attack Based on Canary Obtained through Nonlinear Transformation[C]. Proceedings of 2010 2rid International Conference on Information and Multimedia Technology (ICIMT 2010), Hong Kong 12.28-12.30.2010.
  • 10王永吉,吴敬征,曾海涛,丁丽萍,廖晓锋.隐蔽信道研究[J].软件学报,2010,21(9):2262-2288. 被引量:48

二级参考文献6

共引文献47

同被引文献239

引证文献48

二级引证文献124

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部