期刊文献+

基于Android平台手机防盗软件的设计与实现

Design and Implementation of Mobile Phone Anti-Theft Software Based on Android Platform
下载PDF
导出
摘要 针对Android手机丢失或被有意窃取后所导致的敏感隐私信息泄露等安全隐患,提出并设计了一种基于Android广播机制和后台监听技术的手机防盗软件,实现智能手机短信远程管理功能。不仅能够对手机通讯录、通话记录、短信和内存卡信息通过调用相关函数进行远程获取或删除,而且能够对被盗手机进行GPS定位和静音监听。文章首先介绍该软件系统的总体功能结构,然后详细分析各模块的具体设计方案,并在模拟器和真机两种测试环境下对手机防盗软件进行安全测试。实验测试结果表明:该软件设计合理有效,能够实现预期功能,具有良好的实用性。 For sensitive private information leaks and other security risks after Android phones are lost or stolen intentionally,a mobile phone anti-theft software based on Android broadcast mechanism and backstage monitoring technology was designed,a function of smart phone SMS remote control was realized.The system can remotely obtain or delete the contacts、call records、short message and information in memory card,acquire the GPS positior and execute the mute monitoring for the stolen mobile phone.The overall functional structure of the software system is firstly introduced,and the specific design scheme of each module is analyzed in detail.The mobile phone anti-theft software was tested on simulator and real nnobile phone condition.The tested results show that the software is effective,can achieve anticipative functions,and has good practical value.
出处 《信息安全与技术》 2016年第4期42-47,共6页
关键词 ANDROID 广播机制 后台监听 防盗追踪 隐私销毁 android broadcast mechanism backstage monitoring anti-theft tracking privacy destruction
  • 相关文献

参考文献11

二级参考文献58

  • 1左强,郝玉洁,刘乃琦.基于Symbian的智能手机防火墙研究与设计[J].微计算机信息,2008,24(9):39-41. 被引量:2
  • 2姚昱旻,刘卫国.Android的架构与应用开发研究[J].计算机系统应用,2008,17(11):110-112. 被引量:281
  • 3余志龙,陈昱勋,郑名杰,等.AndroidSDK开发范例大全[M].北京:人民邮电出版社,2010.
  • 4邵艳沽.Android操作系统移植及应用研究[D].湖南:湖南大学,2011.
  • 5Enck W, Ongtang M, McDaniel P. On lightweight mobile phone application certification [C] //Proceedings of the 16th ACM conference on Computer and Communications Security. USA: ACMPress, 2009: 235-245.
  • 6Mohammad Nauman, Sohail Khan, Xinwen Zhang. Apex: Extending android permission model and enforcement with user- defined runtime constraints [C] //Proceedings of the 5th ACM Symposium on Information, Computer and Communications Se- curity. USA: ACM, 2010: 328-332.
  • 7Francesco Di Cerbo, Andrea Girardello. Detection of malicious applications on android OS [C] //Computational Forensics, GRE: Springer, 2011: 138-149.
  • 8Vidas T, Christin N, Cranor L. Curbing android permission creep [C] //Oakland, CA, USA: Proceedings of the Web 2.0 Security and Privacy Workshop, 2011.
  • 9Asaf Shabtai, Yuval Elovici. Applying behavioral detection on android-based devices [J]. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, 48 (5): 235-249.
  • 10赵海军.解决手机隐私泄露刻不容缓[N].中国计算机报,2012-02-27(004).

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部