izpis_h1_title_alt

Pregled in analiza varnosti v operacijskem sistemu Android
ID BATISTIČ, KRISTINA (Author), ID Trček, Denis (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (421,16 KB)
MD5: 2F720064DEAC30AF0CC1080B113F1487
PID: 20.500.12556/rul/6e7c7541-b71e-4d58-bb0d-c012f3db922d

Abstract
Diplomska naloga vsebuje pregled in analizo varnosti sistema Android. Predstavi operacijski sistem in analizira varnostne mehanizme, ki so vgrajeni vanj. Opisano je delovanje sistema in njegova arhitekturna zasnova, nato pa še kako so varnostni mehanizmi vgrajeni vanj. Sledi analiza varnostnih pregledov, ki jih Google izvaja pred objavo v trgovini Google Play. Razložena raba dovoljenj ter prednosti in slabosti le-teh. Opiše druge pomembne varnostne mehanizme kot so peskovnik, SELinux in enkripcija. Sledi opis izvedenega napada in strategije obrambe pred njim. V zaključku je povzetek ugotovitev in možnosti za nadaljnje raziskovanje.

Language:Slovenian
Keywords:Android, varnost, vdor, varnostna luknja, zaščita, ranljivost
Work type:Bachelor thesis/paper
Organization:FRI - Faculty of Computer and Information Science
Year:2016
PID:20.500.12556/RUL-84211 This link opens in a new window
Publication date in RUL:19.07.2016
Views:1687
Downloads:329
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:An Overview and Analysis of Android Security
Abstract:
This bachelor thesis addresses the security of the Android system. It begins with the general overview of the operating system and system's architecture and its built-in security mechanisms. It describes how the system works and the system architecture, and also how the security mechanisms are built into the system. Next, comes the overview of the security of the Google Play marketplace. Permissions are explained as well as their pros and cons. Furthermore, the security mechanisms used for security check of the applications before they go to the marketplace are thoroughly analyzed. In the second part, an executed attack is presented and explained, followed by protection strategies. In the end, we sum up the findings and propose further research on this topic.

Keywords:Android, security, mobile, exploit, vulnerability

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back