期刊文献+

Android安全加固技术 被引量:20

Android Security Reinforcement Technology
下载PDF
导出
摘要 为了保护Android智能手机安全,在深入分析Android系统安全机制的基础上,提出了一个基于强制访问控制的安全加固技术。该技术首先通过修改Android内核,添加一个平台无关的强制访问框架,其次为进程、文件等系统对象添加安全属性,最后通过制定一套细粒度的强制访问规则,对应用程序实施强制访问控制。通过在模拟环境中的测试,验证了该技术可以有效保护Android系统安全。 To protect the Android-powered smartphones, a security reinforcement technology based on mandatory access control is proposed. It is implemented as follows: first, a platform-independent mandatory access control framework is added to the Android kernel; then, security attributes are attached to system objects; finally, a set of fine-grained access rules are made to control applications' permissions. The effectiveness of the technology is proved through the test in an emulator environment.
出处 《计算机系统应用》 2011年第10期74-77,共4页 Computer Systems & Applications
关键词 安全加固 强制访问控制 ANDROID security enforcement mandatory access control Android
  • 相关文献

参考文献5

  • 1Schmidt AD, Schmidt HG, Batyuk L, Clausen JH, Camtepe SA, Albayrak S, Yildizli C. Smartphone malware evolution revisited: Android next target? Proc. of the 4th IEEE International Conference on Malicious and Unwanted Software. 2009. 1-7.
  • 2Android Open Source. http://source.android.com.
  • 3Android Developers. http://androidappdocs.appspot.com/index.html.
  • 4网秦安全播报.http://virus.nctqin.com/android/.
  • 5胡大磊,周学海.平台无关的访问控制框架研究与实现[J].计算机系统应用,2010,19(3):17-20. 被引量:3

二级参考文献7

  • 1陈志平,雷航,杨霞,李欢.嵌入式安全操作系统的研究和实现[J].计算机工程,2007,33(1):83-85. 被引量:10
  • 2Abrams MD, EK, La Padula LI, Olson IW. A generalized framework for access control: An informal descryption. Mclean Virginia: Proc. of the 13th National Computer Security Conf, 1990. 135 - 143.
  • 3Spencer RSS, Loscocco P, et al. The Flask Security Architechture: System Support For Diverse Security Policies. Proc. of the 8th USENIX Security Symp. 1999.123 - 139.
  • 4Loscocco P, Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating System. Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference. 2001.29 - 42.
  • 5Ries, C. Inside Windows Rootkits. http://www.vigil- antminds.com/files/inside_windows_rootldts.pdf.
  • 6Wright CCC, Smalley S. Linux Security Module Framework. Ottawa Linux Symposium, Ottawa, Canada, 2002.
  • 7訾小超,茅兵,曾庆凯,谢立.策略灵活安全系统的设计与实现[J].计算机研究与发展,2004,41(2):299-305. 被引量:2

共引文献2

同被引文献131

引证文献20

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部