"Android" Application security detection software 1. Background Knowledge Collection

Source: Internet
Author: User

Dial-up Blocker

When a user dials a number, the system issues a broadcast: Android.intent.action.NEW_OUTGOING_CALL

We implement the broadcast receiver Outgoingcallreceiver for outgoing calls by inheriting broadcastreceiver, so that it responds only to outgoing calls. After receiving the broadcast, obtain the number of the user's call, and then determine the type of the number, if you are opening the policy manager to set the interface instructions, start Policy Manager

--Mobile phone privacy protection technology based on Android and its implementation

?

1) The modification and extension of the system framework layer is mainly focused on the Checkuidpermission method of the Packagemanagerservice class [7,14], a method of customizing the branch that succeeds in permission detection, Start the application Behavior monitoring module, call the log Output module output application behavior, realize the application behavior monitoring.

2) Use the API provided by the system to monitor the corresponding behavior of specific permissions, including two permissions, namely network access and memory card read and write permissions. By implementing an Android application to monitor both of these permissions, the same log output module is used for processing, so that the behavior information detected in both detection modes can be integrated into a

To facilitate future analysis. The monitoring of network access is implemented using the Trafficstats class provided by the system. Google has a good package of traffic monitoring after Android 2.3, which provides a system-based interface to monitor network access for all applications in the system.

Trafficstats provides a variety of interfaces to monitor network traffic, including incoming and outgoing traffic, and traffic in the case of WiFi, and clearly monitors the behavior of the application to access the network [19,20].

Read/write Monitoring for memory cards is based on the Fileobverser class implementation provided by the system. It is done by using the Notify mechanism of Linux system, which can realize real-time monitoring of the opening, creating, moving and deleting of files or folders in the memory card. At the same time, the application also includes the interactive operation of the log output module to realize the control of the log module.

?

--Application behavior detection of Android based on Rights management

?

"Android" Application security detection software 1. Background Knowledge Collection

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.