Computer Science ›› 2018, Vol. 45 ›› Issue (2): 203-208.doi: 10.11896/j.issn.1002-137X.2018.02.035

Previous Articles     Next Articles

Study on Security Enhancement Mechanism of Android System Kernel Based on Security Domain

CHEN Wei, YANG Qiu-hui and CHENG Xue-mei   

  • Online:2018-02-15 Published:2018-11-13

Abstract: Android system is facing challenges on security with its explosive development recently.Android system’s security is composed of system security and software security.System security is the cornerstone of integral security,which is vital to Android.In order to strengthen the system security,this paper proposed an improved domain generation algorithm to enhance the kernel level security mechanism based on TOMOYO Linux.In addition,the experiment shows that the proposed method is efficient to enhance the security of Android system.

Key words: Android,Security enhancement,Security domain,TOMOYO Linux,Kernel-level security

[1] SHABTAI A,FLEDEL Y,KANONOV U,et al.Google An-droid:A Comprehensive Security Assessment[J].IEEE Security &Privacy,2010,8(2):35-44.
[2] BHASU A.Security Enhanced Linuses LIDS,TOMOYO andSELINUX[R/OL].[2011-12-15].http://it.toolbox.com/blogs/linux-security/security-enhanced-linuses-lids-tomoyo-and-se_linux-4977.
[3] LIU J,SUN K Q,WANG S L.Vulnerability analysis of the Android operating system code based on control flow mining [J].Journal of Tsinghua University(Science and Technology) ,2012,52(10):1335-1339.(in Chinese) 刘剑,孙可钦,汪孙律.基于控制流挖掘的Android系统代码漏洞分析[J].清华大学学报(自然科学版),2012,52(10):1335-1339.
[4] COKER R.Porting nsa security enhanced 1inux to handheld devices:Proc of Linux symp[C]∥Ottawa:Linux symp Inc.2003:117.
[5] SHABTAI A,FLEDEL Y,ELOVICI Y.Securing Android po-wered mobile devices using SELinux[J].Security & Privacy,2010,8(3):36-44.
[6] BUGIEL S,DAVI L,DMITRIENKO A,et al.Practical andlightweight domain isolation on androidd[C]∥Proc of the lst ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York:ACM,2011:51-62.
[7] SMANEY S,CRAIG R.Security enhanced(SE) Android:brin-ging flexible MAC to Android[C]∥Proc of the 20th Annual Network and Distributed System Secrity Symp.USA:ANDSSS,2013:1-5.
[8] BUGIEL S,HEUSER S,SADEGHI A R.Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies[C]∥USENIX Association.Berkeley:USENIX Association,2013:131-146.
[9] DING M,YU L.Design and Implementation of Android OS Security Enhancement Scheme[J].Computer Knowledge and Technology,2015,11(33):19-20.(in Chinese) 丁汨,于琳.Android系统安全增强方案的设计与实现[J].电脑知识与技术,2015,1(33):19-20.
[10] LU Y M,LI Y F,YING L Y,et al.Security Analysis and Enhancement of Third-Party Android Push Service[J].Journal of Computer Research and Development,2016,3(11):2431-2445.(in Chinese) 路晔绵,李轶夫,应凌云,等.Android应用第三方推送服务安全分析与安全增强[J].计算机研究与发展,2016,53(11):2431-2445.
[11] WAN Y,WANG G L,FENG X Y.An evaluation model for information security of Android application based on analytic hie -rarchy process[C]∥World Automation Congress.USA:WAC,2016:1-6.
[12] XU M Z,WUN W Q,ALAM M.Security enhancement of secure USB debugging in Android system[C]∥Consumer Communication and Networking Conference(CCNC).USA:IEEE,2016:134-139.
[13] Mergem status[EB/OL].http://seandroid.bitbucket.org/Merge-Status.html.
[14] ELECTRONICS S.Samsung KNOX[EB/OL].http://www.samsung.com/global/business/mobile/solution/security/samsung-knox.
[15] Knox workspace supported devices[EB/OL].https://www.samsungknox.cn/en/solutions/knox/technical/knoxsupporteddevices.
[16] TOMOYO Linux[EB/OL].http://tomoyo.sourceforge.jp.
[17] LI F.Analysis and Enhancement of Security Mecha-nism Based on Android OS[D].Wuhan:Huazhong University of Science & Technology,2012.(in Chinese) 李凡.Android系统安全机制的分析与增强[D].武汉:华中科技大学,2012.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!