Dissertations / Theses on the topic 'Android system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 34 dissertations / theses for your research on the topic 'Android system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Zhiyong. "A multi-agent security system for Android platform." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43775.
Full textXu, Mingzhe. "Security Enhancement of Secure USB Debugging in Android System." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1417536423.
Full textBurguera, Hidalgo Iker. "Behavior-based malware detection system for the Android platform." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73647.
Full textVančo, Matúš. "Dynamická úprava bezpečnostní politiky na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255426.
Full textPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Full textWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Borek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Full textSmartphones ger tillgång till en uppsjö av privat information som potentiellt kan leda till finansiella och personliga svårigheter. Därför måste de vara väl skyddade. En dynamisk lösning behövs som skyddar Android-telefoner i realtid. Systemanrop har tidigare undersökts som en effektiv metod för dynamisk analys av Android. Emellertid fokuserade dessa tidigare studier på systemanrop i en emulerad sandbox miljö, vilket inte visar lämpligheten av detta tillvägagångssätt för realtidsanalys av själva enheten. Detta arbete fokuserar på analys av Linux kärnan systemanrop på ARMv8 arkitekturen. Givet begränsningarna som existerar i Android-telefoner är det väsentligt att minimera resurserna som krävs för analyserna. Därför fokuserade vi på sekvenseringen av systemanropen. Med detta tillvägagångssätt sökte vi en metod som skulle kunna användas för realtidsdetektering av skadliga program direkt på Android-telefoner. Vi experimenterade dessutom med olika funktionsvektorer för att representera data; histogram, n-gram och co-occurrence matriser. All data hämtades från en riktig Android enhet då de existerande Android emulatorerna visade sig vara olämpliga för att emulera ett system med ARMv8 arkitekturen. Resultaten visar att Linus kärnans sekvensering har tillräckligt med information för att upptäcka skadligt beteende av skadliga applikationer på ARMv8 arkitekturen. Alla funktionsvektorer presterade bra. N-gram och cooccurrence matriserna uppnådde till och med lysande resultat. För att reducera beräkningskomplexiteten av analysen, experimenterade vi med att enbart använda de vanligaste systemanropen. Fast noggrannheten minskade lite, var det värt uppoffringen eftersom beräkningskomplexiteten reducerades märkbart.
Trabalza, Daniele. "Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119825.
Full textPalm, Alexander, and Benjamin Gafvelin. "Ethical Hacking of Android Auto in the Context of Road Safety." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299647.
Full textI takt med en evigt ökande efterfrågan på att sammankoppla smarttelefoner med infotainmentsystem, har allt fler börjat använda Android Auto i sina fordon världen över. En bieffekt av att allt fler sammankopplar sina mobiler till infotainmentsystem, är att det leder till fler möjligheter för illvilliga parter att stjäla privat data och sätta Android Autoanvändares liv i fara. Målet med denna avhandling är att fastställa hur säkert Android Auto är i avseende till vägsäkerhet. Den huvudsakliga forskningsfrågan är att lista ut om Android Auto kan attackeras av attacker som utnyttjar sårbarheter i Android operativsystemet. Forskningsfrågan besvarades genom att skapa flertal konceptattacker mot Android Auto användandes av ett emulerat infotainmentsystem och mobiltelefoner. En utredning utfördes även gällande applikationens kommunikationskanal mellan telefonen och infotainmentskärmen. Resultatet från denna avhandling demonstrerade att många attacker är tillräckligt allvarliga för att äventyra trafikanternas säkerhet. Det finns en avsevärd risk för framgångsrika attacker när Android Auto körs lokalt på telefonen utan en USB koppling till infotainmentsystemet, och en liten risk när telefonen är kopplad till infotainmentsystemet. Avlyssning och uppfångning av kommunikationen i USB kanalen visade att en krypteringsalgoritm vars version har existerande sårbarheter kan avkrypteras och utnyttjas för att potentiellt attackera Android Auto.
Krishnan, Neelima. "Android Hypovisors: Securing Mobile Devices through High-Performance, Light-Weight, Subsystem Isolation with Integrity Checking and Auditing Capabilities." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/51129.
Full textMaster of Science
Bjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Full textZeitz, Kimberly Ann. "An Optimized Alert System Based on Geospatial Location Data." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49265.
Full textMaster of Science
Motuzas, Armandas. "Patalpų apsaugos sistemos kūrimas Arduino mikrokontroleriu." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140716_143615-40294.
Full textIn this Project were been familiarized with security systems, Arduino platform and Android system. Designing a standart security system with Arduino microcontroller was choosen the most suitable components. Was choosed and analized possible ways to communicate between the Arduino platform and the Android operating system. Choosen best way of comunication, has been realized in standart security system that can be operated by remote with web page or Android application.
Thakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.
Full textWhitelaw, Clayton. "Precise Detection of Injection Attacks on Concrete Systems." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Full textMUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textDahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.
Full textMAIORCA, DAVIDE. "Design and implementation of robust systems for secure malware detection." Doctoral thesis, Università degli Studi di Cagliari, 2016. http://hdl.handle.net/11584/266872.
Full textFergus, Seamus. "Internet Safety for Children : Stranger danger, misbehaviour and problems when online." Thesis, Luleå tekniska universitet, Datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70126.
Full textSokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Full textNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Full textB.S.
Bachelors
Health and Public Affairs
Legal Studies
Lin, Yu-Cheng, and 林禹成. "A Security Vulnerability Analysis System for Android Application." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/42unf5.
Full textCosta, Sara Silva. "Security threats management in android systems." Master's thesis, 2017. http://hdl.handle.net/1822/55037.
Full textWith the exponential use of mobile phones to handle sensitive information, the intrusion systems development has also increased. Malicious software is constantly being developed and the intrusion techniques are increasingly more sophisticated. Security protection systems trying to counteract these intrusions are constantly being improved and updated. Being Android one of the most popular operating systems, it became an intrusion’s methods development target. Developed security solutions constantly monitor their host system and by accessing a set of defined parameters they try to find potentially harmful changes. An important topic when addressing malicious applications detection is the malware identification and characterization. Usually, to separate the normal system behavior from the malicious behavior, security systems employ machine learning or data mining techniques. However, with the constant evolution of malicious applications, such techniques are still far from being capable of completely responding to the market needs. This dissertation aim was to verify if malicious behavior patterns definition is a viable way of addressing this challenge. As part of the proposed research two data mining classification models were built and tested with the collected data, and their performances were compared. the RapidMiner software was used for the proposed model development and testing, and data was collected from the FlowDroid application. To facilitate the understanding of the security potential of the Android framework, research was done on the its architecture, overall structure, and security methods, including its protection mechanisms and breaches. It was also done a study on models threats/attacks’ description, as well as, on the current existing applications for anti-mobile threats, analyzing their strengths and weaknesses.
Com o uso exponencial de telefones para lidar com informações sensíveis, o desenvolvimento de sistemas de intrusão também aumentou. Softwares maliciosos estão constantemente a ser desenvolvidos e as técnicas de intrusão são cada vez mais sofisticadas. Para neutralizar essas intrusões, os sistemas de proteção de segurança precisam constantemente de ser melhorados e atualizados. Sendo o Android um dos sistemas operativos (SO) mais populares, tornou-se também num alvo de desenvolvimento de métodos de intrusão. As soluções de segurança desenvolvidas monitoram constantemente o sistema em que se encontram e acedendo a um o conjunto definido de parâmetros procuram alterações potencialmente prejudiciais. Um tópico importante ao abordar aplicações mal-intencionadas é a identificação e caracterização do malware. Normalmente, para separar o comportamento normal do sistema do comportamento mal-intencionado, os sistemas de segurança empregam técnicas de machine learning ou de data mining. No entanto, com a constante evolução das aplicações maliciosas, tais técnicas ainda estão longe de serem capazes de responder completamente às necessidades do mercado. Esta dissertação teve como objetivo verificar se os padrões de comportamento malicioso são uma forma viável de enfrentar esse desafio. Para responder à pesquisa proposta foram construídos e testados dois modelos de classificação de dados, usando técnicas de data mining, e com os dados recolhidos compararam-se os seus desempenhos. Para o desenvolvimento e teste do modelo proposto foi utilizado o software RapidMiner, e os dados foram recolhidos através do uso da aplicação FlowDroid. Para facilitar a compreensão sobre as potencialidades de segurança da framework do Android, realizou-se uma pesquisa sobre a sua arquitetura, estrutura geral e métodos de segurança, incluindo seus mecanismos de defesa e algumas das suas limitações. Além disso, realizou-se um estudo sobre algumas das atuais aplicações existentes para a defesa contra aplicações maliciosas, analisando os seus pontos fortes e fracos.
(9728690), Ayush Maharjan. "Ranking of Android Apps based on Security Evidences." Thesis, 2021.
Find full textWith the large number of Android apps available in app stores such as Google Play, it has become increasingly challenging to choose among the apps. The users generally select the apps based on the ratings and reviews of other users, or the recommendations from the app store. But it is very important to take the security into consideration while choosing an app with the increasing security and privacy concerns with mobile apps. This thesis proposes different ranking schemes for Android apps based on security apps evaluated from the static code analysis tools that are available. It proposes the ranking schemes based on the categories of evidences reported by the tools, based on the frequency of each category, and based on the severity of each evidence. The evidences are gathered, and rankings are generated based on the theory of Subjective Logic. In addition to these ranking schemes, the tools are themselves evaluated against the Ghera benchmark. Finally, this work proposes two additional schemes to combine the evidences from difference tools to provide a combined ranking.
Gunadi, Hendra. "Design and Analysis of Mobile Operating System Security Architecture using Formal Methods." Phd thesis, 2017. http://hdl.handle.net/1885/133821.
Full textVigário, Francisco Dias Pereira Nunes. "Assessing and Addressing the Security of Persistent Data in the Android Operating System." Master's thesis, 2015. http://hdl.handle.net/10400.6/5894.
Full textA adoção generalizada de dispositivos móveis, e a maneira como os utilizadores interagem com eles, levou ao desenvolvimento de novas formas de execução, distribuição e instalação de aplicações, abrindo também caminho para novos modelos de negócio. As aplicações móveis podem ser compradas como uma única peça de software, ou algumas das suas características, extensões ou conteúdos podem ser também objeto de compra. Em muitas aplicações para o Sistema Operativo Android, os itens pagos são, na maioria das vezes, obtidos através das chamadas compras na aplicação (da expressão in-app purchases), um recurso que permite ao utilizador fazer micro pagamentos no contexto da aplicação via Google Play Store. A receita de muitos programadores é obtida através da venda de pequenos recursos após lançar uma versão gratuita ou paga da sua aplicação. Por outro lado, as capacidades crescentes dos dispositivos móveis, juntamente com a sua natureza pessoal, transforma-os em agregadores de informação privada e alvos interessantes para os atacantes. Além disso, os dados de controlo armazenados nos dispositivos podem ser manipulados para alterar o fluxo de programas e aceder a funcionalidades bloqueadas ou a conteúdo sem pagar. Esta dissertação está focada em problemas de armazenamento seguro de dados em dispositivos móveis, especialmente em sistemas Android. A principal contribuição é a quantificação da suscetibilidade à manipulação e à exposição de dados em aplicações Android através de um exaustivo estudo de muitas aplicações retiradas da loja oficial Android. Este estudo incluiu a construção de dois conjuntos de dados com um total de 1542 aplicações (849 jogos e 693 aplicações comuns) e a análise humana de cada um deles. O método consistia em: utilizar as aplicações num smartphone; transferi-las para um computador com um sistema operativo Linux de seguida; analisar e modificar os seus dados (quando possível); e por fim transferi-las de volta para o ambiente Android. Todo o procedimento aproveita a funcionalidade de backup disponibilizada pelo sistema operativo e usa apenas ferramentas disponíveis livremente, não sendo necessário permissões de administração no dispositivo móvel, comprovando a viabilidade da abordagem. No caso do conjunto de jogos, verificou-se que pelo menos 1 em cada 6 era suscetível à manipulação de dados, o que significa que foi possível obter itens pagos sem qualquer pagamento. No caso do conjunto de aplicações comuns, 1 em cada 5 é suscetível ao mesmo problema de manipulação de dados ou foi possível obter informação armazenada sensível, como palavras-passe e números de identificação pessoal em texto limpo. As aplicações vulneráveis não incluem mecanismos para evitar que os dados sejam vistos ou modificados, o que constituiria a melhor forma de atenuar o problema. Com base no que foi aprendido, várias propostas generalistas para resolver o problema são discutidos no final da dissertação.
TUNG, LUN-MING, and 董倫銘. "A Remote Control System for Improving the Mobile Device Security Based on SE Android." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/82144847227033942980.
Full text國立高雄師範大學
軟體工程與管理學系
104
Mobile devices becoming more authoritative and developers of the device are continuously striving to combine the device with human life for the enhancement of user intention. On the other hand, mobile device system security also needs to upgrade in order to protect the privacy of users’ private messages. The purpose of this paper is to use mobile device permission management systems to protect user privacy information from malicious attacks. We introduce the Android Open Source Project (AOSP), extensible security framework “SE Android”. It was developed by Google and National Security Agency (NSA). SE Android provides a security application that supports Android systems of permission management. We modify the application combined with remote server to form remote control software that provides additional support features to Mobile Device Management (MDM).
(10732161), Yung Han Yoon. "A FRAMEWORK FOR THE SOFTWARE SECURITY ANALYSIS OF MOBILEPOWER SYSTEMS." Thesis, 2021.
Find full textLIN, CHING-CHANG, and 林慶展. "The Wireless Remote Monitoring Home Security and Appliance System in Combination of Android App and Arduino." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/94j534.
Full text逢甲大學
自動控制工程學系
105
Smart mobile devices flourish in the recent years. We need a computer to deal with the program before, but now we can finish the most of all in smart phone or tab-let. It looks like the PC, to install third-party software on the smart mobile devices, it can achieve our goal. For an example, app (application) is a typical mobile software, it makes our mobile being more convenience by the technology advancement and web development. From game playing, vedio calling, file editing, evan nowdays remote monitoring, app has became the trend of the times. Since the development of the IOT (Internet of Things), by using the network propagate technology, information had be applied to all levels. Diverse sensors can not limit to wired device,for examples, bluetooths, WIFI, 3G network…etc. They are all the most efficient way to deliver the message of wireless device. This subject is explaining how to use app system of mo-bile, combined with arduino for monitoring security of remote home. Through the arduino in the central control system integrated with App, and finally controlled the home appliances through the cloud of real-time detection curve. Let make it safe and convenient.
Kuo, Hsin-Yi, and 郭心怡. "Using Mobile Peer-to-Peer skills to develop a Security System for Family members on Android." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/61000578827662681633.
Full text淡江大學
資訊工程學系碩士在職專班
98
Technology develops and changes with each passing day rapidly. In such a mobile life with Internet, the new generation has relied on mobile phones tremendously. Hence, a mobile phone will be a more appropriate medium for information communication better than a computer. In view of this, Google Maps and Global Positioning System (GPS) were utilized in this study, plus the property of MP2P on mobile phones, to implement and construct the application of Security System for Family Members based on Android. The software “Security System for Family Members” is an application service program widely feasible for the public. By integrating message transmission mechanisms and GPS, and by utilizing the “Android” launched by Google recently, it has evolved into a diversified application service program. Through such an application service, we can guard our family members, especially the disabled or handicapped ones, by applying this software “Security System for Family Members” to the processes in which the elders are going out or children are going to school and returning home from school, and so on. This software “Security System for Family Members” is able to prevent elders and children from wandering away, and reduce the time spent on looking for missing family members if they get lost. Also, it can prevent the panic situation due to the occurrence of any accident.
Yang, Hsing-Chung, and 楊興忠. "A Mobile Security and Surveillance System Based on Android Embedded Platform - A Case Study for Indoor Parking." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/y3c4wb.
Full text國立中正大學
通訊資訊數位學習碩士在職專班
103
In recent years, due to the rapid growth of wireless internet, and the appearance of smart phones and other mobile devices with small size, good efficacy and low cost, the related applications have more advantages and space. In this paper, android smart phones, quadcopters, video streaming was used to design and implement the mobile security and surveillance system with an android embedded system. RTP/RTSP application layer protocols and TCP/UDP protocols are used in Wi-Fi wireless network. The smart phone on the quadcopter provides the live video stream. The security guard can see the remote picture by using the monitoring center computer with VLC player. In the future, the contribution of this paper can be applied to residential buildings and public indoor parks to save the human resources, enhance the reactive processing speed, improve the premise safety and reduce the property losses.
(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.
Find full textYANG, CHIA-PEI, and 楊家沛. "Security Risks of Communication APP Services and Near Field Communication in Mobile Android Systems." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8b4zhw.
Full text中央警察大學
資訊管理研究所
107
The rapid advancement of science and technology has made people's lives more convenient. Many of the original complicated procedures have become more simple after the growth of technology and technology. As in the past, the texts and books electronically made the writing, management and carrying of texts easier. In daily life, the "payment" action during shopping can also be done by using electronic wallet or mobile payment, and gradually replace the original banknote transaction. With the maturity of wireless Internet access and the popularity of mobile devices, the development of mobile commerce has made people's economic activities more active. The emergence of smart phones with NFC (Near Field Communication) function is a great tool, and brings convenience for mobile payment. NFC security is also receiving more and more attention. Due to the characteristics of NFC, it can be easily integrated into a large number of devices at a very low cost. However, the advancement brings convenience and risks. The most difficult problem in the highly information age is how to ensure information security. With the rise of communication software, instant messaging has gradually replaced the traditional mode of telephone communication. Although these technological advances have enriched people's lives, they have made these readily available means of communication a hotbed of potential crime. This article will combine the actual situation of the case, using the existing NFC transmission vulnerability, to confirm the feasibility of using NFC transmission function to carry out man-in-the-middle attacks on another mobile vehicle. Combined with the world-famous FB Messenger, the phone after Root is backed up by the Android Debug Bridge (ADB) tool, and after extracting its data, use Cygwin to restore the operational data of the Windows environment, and use SQLite Database Browser. Analysis of information such as chat records within it. Follow-up through the case study, the current NFC security architecture risks, and the preventable methods that can be observed and analyzed.
Wang, Liang-Chun, and 王亮鈞. "Enhancing Security Features in Off-the-shelf Operating Systems: A Case Study with The Android Open Source Project." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/w57jt9.
Full text國立交通大學
資訊科學與工程研究所
105
Mobile devices have many function such as surfing the Internet, taking pictures, recording and locating. And can be turned to many functions and features like receiving and sending message, e-mail, GPS, etc. Mobile devices bring users a lot of convenience, but also bring us privacy-sensitive problem. For the full control of the whole mobile, there are many off-the-shelf MDM (Mobile Device Manager) App. Through MDM, we can limit sensitive behaviors of Apps or the whole device for the privacy policy of the corporate. But normal Apps can’t take powerful control of the whole device. So we install MDM client on the device as system App, thus MDM can take advantage of system API. Then we trace the source code of AOSP (Android Open Source Project). And insert some hooks in the points which control the usage of sensitive behavior to make MDM more powerful. After that, we use SELinux on Android to achieve the goal of deeper control of the whole device.
Dbouba, Selsabil. "Caractérisation et étude de l’impact des permissions dans les applications mobiles." Thèse, 2017. http://hdl.handle.net/1866/20844.
Full text