Computer and Modernization

Previous Articles     Next Articles

Design and Verification of New Defense Model for Android Mobile Phone Access Vulnerability

  

  1. Wuhan Research Institute of Posts and Telecommunications, Wuhan 430074, China
  • Received:2017-02-21 Online:2017-09-20 Published:2017-09-19

Abstract: Today, smart phone security issues more and more arouse people’s attention. Trojan, as a highly hidden and deceptive attack means, has continuously spreading on the platform, although has been widespread concern, but there is no good way to suppress. The right to mention the loopholes for the Android system security threats is enormous. Once the attacker has the opportunity to leak through the kernel memory address of the kernel, he can close the kernel memory write protection to write the kernel memory to execute malicious commands permissions, and ultimately achieve the purpose of downloading Trojans. In order to deal with this vulnerability, we first analyze SEAndroid mechanism, and propose a kernel vulnerability prevention module combining kernel enhancement and packet filtering. Based on this mechanism, we verify the validity of the proposed prevention module.

Key words: Android system, mobile phone Trojans, elevate permissions loophole, mobile phone firewall

CLC Number: