Android终端关键硬件环境可信评估方法研究
Research on Trusted Evaluation Method for Key Hardware Environment of Android Terminal
DOI: 10.12677/sea.2025.144084, PDF,   
作者: 周云涛:西北工业大学计算机学院,陕西 西安;西北工业大学人力资源部,陕西 西安;姚红静, 魏 琪:西北工业大学计算机学院,陕西 西安
关键词: Android系统移动智能终端嵌入式系统硬件环境安全可信Android System Mobile Intelligent Terminal Embedded System Hardware Environment Secure and Trustworthy
摘要: Android系统因其开放源代码的特性,面临日益严重的安全问题,移动智能终端应用已成为网络恶意攻击的主要目标。作为嵌入式系统,移动终端的底层硬件环境安全是确保其整体可信性和可靠性的关键。基于可信计算思想,针对影响Android终端软件性能的CPU、内存和电池等关键硬件进行实时监测,通过量化评估硬件环境可信水平,为移动终端平台的安全解决方案提供技术支撑,从而保障系统运行的稳定、安全和用户体验。
Abstract: Due to its open-source nature, the Android system is increasingly vulnerable to security threats, making mobile intelligent terminals a prime target for malicious attacks. As an embedded system, the security of the underlying hardware environment is critical to ensuring the overall trustworthiness and reliability of mobile terminals. This study employs the principles of trusted computing to monitor key hardware parameters in real time, such as CPU, memory, and battery, quantitatively evaluating the trustworthiness level of the hardware environment. The research provides technical support for enhancing mobile terminal platform security, thereby ensuring stable system operation and a secure user experience.
文章引用:周云涛, 姚红静, 魏琪. Android终端关键硬件环境可信评估方法研究[J]. 软件工程与应用, 2025, 14(4): 948-959. https://doi.org/10.12677/sea.2025.144084

参考文献

[1] Trusted Computing Group.
https://trustedcomputinggroup.org/
[2] 张焕国, 罗捷, 金刚, 等. 可信计算研究进展[J]. 武汉大学学报(理学版), 2006, 52(5): 513-518.
[3] Google. Profile Your App Performance.
https://developer.android.com/studio/profile?hl=zh-cn
[4] Google (2021) Battery Historian Tool.
https://github.com/google/battery-historian
[5] Duvvur, V. (2023) Modernizing with Confidence: Strategies for Enhancing Cybersecurity and Compliance in Legacy System Upgrade. International Journal of Emerging Trends in Computer Science and Information Technology, 4, 41-48. [Google Scholar] [CrossRef
[6] Zhao, X., Huang, G., Jiang, J., Gao, L. and Li, M. (2021) Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing. Computers & Security, 111, Article 102463. [Google Scholar] [CrossRef
[7] Khalid, S. and Hussain, F.B. (2024) Volmemdroid—Investigating Android Malware Insights with Volatile Memory Artifacts. Expert Systems with Applications, 253, Article 124347. [Google Scholar] [CrossRef
[8] Bampatsikos, M., Politis, I., Bolgouras, V. and Xenakis, C. (2023) Multi-Attribute Decision Making-Based Trust Score Calculation in Trust Management in IoT. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, 29 August-1 September 2023, 1-8. [Google Scholar] [CrossRef
[9] Nazir, A., Iqbal, Z. and Muhammad, Z. (2025) ZTA: A Novel Zero Trust Framework for Detection and Prevention of Malicious Android Applications. Wireless Networks, 31, 3187-3203. [Google Scholar] [CrossRef
[10] 苏敏. Android系统UI性能测试方法的研究[D]: [硕士学位论文]. 武汉: 武汉理工大学, 2018.
[11] Testin: 2013年8月中国好应用质量排行[EB/OL].
https://www.docin.com/p-703974880.html, 2025-07-25.
[12] 文伟平, 梅瑞, 宁戈. Android恶意软件检测技术分析和应用研究[J]. 通信学报, 2014, 35(8): 78-85.
[13] Votipka, D., Vidas, T. and Christin, N. (2013) Passe-Partout: A General Collection Methodology for Android Devices. IEEE Transactions on Information Forensics and Security, 8, 1937-1946. [Google Scholar] [CrossRef