期刊文献+

Android移动操作系统脆弱性分析 被引量:1

Analysis of Android Mobile Operating System's Vulnerability
下载PDF
导出
摘要 对Android系统的多种脆弱性进行了理论上的分析。根据目前已知的Android系统安全问题,归纳分析出Android系统脆弱性所在,主要包括Root、权限机制、签名机制、沙箱机制、应用安装机制、协议、版本碎片化、栈溢出保护、Linux内核等,并且通过示例给出了脆弱性的表现形式。 It makes a theoretical analysis on these vulnerabilities of Android mobile operating system. Based on the Android system secu-rity issues currently known, it summarizes and analyzes the vulnerabilities points, including root, permission mechanism, signa-ture mechanism, sandbox mechanism, application instal ation mechanisms, protocol, version fragmentation, stack overflow and the Linux kernel. The manifestations of vulnerability are given by the examples.
作者 孙伟
出处 《邮电设计技术》 2014年第5期68-71,共4页 Designing Techniques of Posts and Telecommunications
关键词 ANDROID操作系统 脆弱性 权限 签名 Android operating system Vulnerability Permission Signature
  • 相关文献

参考文献4

  • 1Lucas Davi, Alexandra Dmitrienko. Privilege Escalation Attacks on Android. Lecture Notes in Computer Science. 6531.2011: 346-360.
  • 2Ari Takanen, Jared DeMott. Fuzzing for Software Security Testing and Quality Assurance. Artech House Print on Demand. 2008.
  • 3Qi Lanlan, Xu Dan. New Development of Fuzzing-based Vulnerabili- ties Mining Researeh. Instrumentation, Measurement, Computer, Com- munication and Control, 2011 First International Conference on. 2011 : 400-403.
  • 4Cheol Jeon, WooChur Kim. Enhancing security enforcement on unmod- ified Android. Proceedings of the 28th Annual ACM Symposium on Ap- plied Computing. 2013 : 1655-1656.

同被引文献21

  • 1Wiener Y. and Vardi Y., Relationship between Organizational Culture and Individual Motivation: A Conceptual Integration[J] Psychology Report, Vol.67, 1990 (3) : 295-306.
  • 2Werner, S., Brouthers, L. E. and Brouthers,K.D., International Risk and Perceived Environmental Uncertainty: The Dimensionality and Internal Consistency of Miller's Measure [J], Journal of International Business Studies, Vol,27, 1996: 571-587.
  • 3Utkarsh Srivastava, Santosh Gopatkrishnan, Impact of Big Data Analytics on Banking Sector: Learning for Indian Banks[J], Procedia Computer Science, 2015 (50): 643-652.
  • 4Janakiraman Moorthy, Big Data: Prospects and Challenges[J], The Journal for Decision Makers, 2015, 40(1) : 74-96.
  • 5Dhruba Borthakur, Joydeep Sen Sarma, Jonathan Gray. Apache Hadoop Goes Real time at Facebook, 2011[C]. Procof SIGMQD 2011 New York: ACM,2011,1071-1080.
  • 6钱昱,免疫学原理与技术[M],北京:高等教育出版社,2011.
  • 7许晖,纪春礼,李季,周斌,金鑫.基于组织免疫视角的科技型中小企业风险应对机理研究[J].管理世界,2011,27(2):142-154. 被引量:46
  • 8程国平,张剑光,徐新.企业免疫系统的应答机制研究[J].中国地质大学学报(社会科学版),2011,11(2):120-124. 被引量:6
  • 9孙松儿.云计算环境下安全风险分析[J].网络与信息,2012,26(6):68-69. 被引量:7
  • 10刘静如.大数据:金融企业的盾与剑——浅谈风险管理与消费智能[J].中国金融电脑,2012(9):83-83. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部