android虚拟应用沙箱,基于虚拟化及重定向技术的Android沙箱设计与实现

The design and implemention of Android sandbox based on vitualization and redirection technology

CUI Haina

1

2

崔海娜(1991-),女,北京邮电大学硕士研究生,主要研究方向:终端安全

ZHANG Tianle

1

2

张天乐(1977-),男,副教授、硕导,主要研究方向:终端安全

1、School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China

2、 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China 100876

Abstract:The employees are getting rid of the shackles of the original fixed working environment with the popularity of mobile devices. Enterprise mobility management(EMM) as a solution to enterprise mobile security and the problems of management arises at the historic moment. Mobile content management(MCM), one of the elements of EMM\'s mobility management, achieves the isolation, monitoring and controlling of distribution and accessing of sensitive information by using the sandbox technology. That is to say, mobile security sandbox is one of the kernel technologies of EMM. Mobile security sandbox is divided into ordinary sandbox and the core competitiveness of the sandbox, mobile security sandbox is a non-antivirus security tool. This paper analyzes the existing problems of current mobile sandboxes, and the existing PC end sandbox systems, and then proposes a new Android sandbox system which based on virtual and redirect technology. By virtualizing and redirecting the four major components, system services and IO operations of the Android system, the sandbox which designed in this article provides an independent and safe running environment for the applications that with untrustworthy property and enables the application to be ran both inside and outside the sandbox. The sandbox provides file system isolation so that file data generated by applications running in the sandbox can be managed. The sandbox provides file system isolation so that file data generated by applications running in the sandbox can be managed. Redirection technology resolves resource conflicts that may occur when the sandbox is started simultaneously and externally. In addition, this article also achieved without modifying the application installation package and in transparent external circumstances installed directly inside the sandbox.And the test results show that the classification of data manipulation enhances the sandbox protection of data integrity.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值