Research based on the method of Android system active defense without Root permission

In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. The new mechanism was de...

Full description

Saved in:
Bibliographic Details
Published in网络与信息安全学报 Vol. 2; no. 1; pp. 65 - 73
Main Author Jing-qiang LIU,Bin LI,Li-zhang CHEN,Bin CHEN
Format Journal Article
LanguageEnglish
Published POSTS&TELECOM PRESS Co., LTD 01.01.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. The new mechanism was designed and implemented to avoid the security problem caused by the traditional protection application of Hooking system function in the kernel layer and the limitations with calling API in the application layer ineffectively. The interception of sensitive behavior and the protection of smartphone were both achieved.
AbstractList In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. The new mechanism was designed and implemented to avoid the security problem caused by the traditional protection application of Hooking system function in the kernel layer and the limitations with calling API in the application layer ineffectively. The interception of sensitive behavior and the protection of smartphone were both achieved.
Author Jing-qiang LIU,Bin LI,Li-zhang CHEN,Bin CHEN
Author_xml – sequence: 1
  fullname: Jing-qiang LIU,Bin LI,Li-zhang CHEN,Bin CHEN
  organization: College of Computer Science and Technology, Harbin Institute of Technology, (Weihai), Weihai 264209, China
BookMark eNqtjs1OwzAQhH0oUgv0HfbAtcFOnDg-IgSCawUSN2trbxpXjV3Z5qdvT4TgDTjNzKfRaC7ZIsRAjN0IXgmhW317qHzOoaq57jaC66_Zia7inItmwVZ_-G3J1jn7HW971WpeyxV73VImTHaEHWZyEAOUkWCiMsY5DXAXXIreQT7nQhOgLf6DwNFAIRN8-rn3XmAbY4ETpWm-4WO4ZhcDHjOtf_WKPT8-vNw_bVzEgzklP2E6m4je_ICY9gZT8fZIprcOG41SyUFKRQq7WnbK9twKy1E0zX9ufQN5eWV7
ContentType Journal Article
DBID DOA
DOI 10.11959/j.issn.2096-109x.2016.00013
DatabaseName DOAJ Directory of Open Access Journals
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EndPage 73
ExternalDocumentID oai_doaj_org_article_8cda39a474f447e7a62467c80c1c0a13
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
GROUPED_DOAJ
M~E
ID FETCH-doaj_primary_oai_doaj_org_article_8cda39a474f447e7a62467c80c1c0a133
IEDL.DBID DOA
ISSN 2096-109X
IngestDate Wed Aug 27 01:30:30 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-doaj_primary_oai_doaj_org_article_8cda39a474f447e7a62467c80c1c0a133
OpenAccessLink https://doaj.org/article/8cda39a474f447e7a62467c80c1c0a13
ParticipantIDs doaj_primary_oai_doaj_org_article_8cda39a474f447e7a62467c80c1c0a13
PublicationCentury 2000
PublicationDate 2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-01
  day: 01
PublicationDecade 2010
PublicationTitle 网络与信息安全学报
PublicationYear 2016
Publisher POSTS&TELECOM PRESS Co., LTD
Publisher_xml – name: POSTS&TELECOM PRESS Co., LTD
SSID ssib058759024
Score 3.8736916
Snippet In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective...
SourceID doaj
SourceType Open Website
StartPage 65
SubjectTerms active defense without root
android system
aop
behavior interception
dalvik
hook
Title Research based on the method of Android system active defense without Root permission
URI https://doaj.org/article/8cda39a474f447e7a62467c80c1c0a13
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA6yg3gRRcXfvMOude2aps1RZWMK8yAOeitZXwJ6aIZ04Mm_3feSDXbzoJceGkjCS9-PJF-_T4hhZTDV6LIEFWIiMcsSg1WRFM5ZFnqvnON_h-cvaraQz3VR70h9MSYs0gNHw42qFk2ujSylk7K0pVFj8u22StusTU3Qqx1TztvZTNGXVFAVrtOgaEuNimKNrvfFMEQIXejRR_Cwu23bF0O8-FIiZZWDHe7-kGSmR-JwUx3CfZzVsdiz3YlYbNFxwCkHwXdAVRtE7WfwDhiU6N8RIiszmBDCAK2jLaoFPmn16x5eve9hxdgXBr52p-JpOnl7nCU8j2YVSScapoEOL8g4zcY4zW_Gyc_EoPOdPReQ5UanrcOSPFTmShpclkZjhS6nmke5C_Hw9_Eu_6OTK3HAyxHPOa7FoP9c2xvK_P3yNiwyPeffkx_UPLEH
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+based+on+the+method+of+Android+system+active+defense+without+Root+permission&rft.jtitle=%E7%BD%91%E7%BB%9C%E4%B8%8E%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E5%AD%A6%E6%8A%A5&rft.au=Jing-qiang+LIU%2CBin+LI%2CLi-zhang+CHEN%2CBin+CHEN&rft.date=2016-01-01&rft.pub=POSTS%26TELECOM+PRESS+Co.%2C+LTD&rft.issn=2096-109X&rft.volume=2&rft.issue=1&rft.spage=65&rft.epage=73&rft_id=info:doi/10.11959%2Fj.issn.2096-109x.2016.00013&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_8cda39a474f447e7a62467c80c1c0a13
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2096-109X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2096-109X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2096-109X&client=summon