Netinfo Security ›› 2017, Vol. 17 ›› Issue (12): 61-66.doi: 10.3969/j.issn.1671-1122.2017.12.011

• Orginal Article • Previous Articles     Next Articles

A Defense Scheme for Activity Hijack Based on Safe Container

Cancan CHEN, Haoliang CUI, Wen ZHANG, Shaozhang NIU   

  1. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2017-08-31 Online:2017-12-20 Published:2020-05-12

Abstract:

As a malicious attack to steal user privacy data, Activity hijack causes serious security threat to user's private data. For the malicious test link of the Activity hijack attacks, this paper puts forward the concept of using safe container operation environment that isolate the application from the external environment. It is hard for malicious attackers to get the running state and the information from the running task about the application running in the safe container, only can get the fake information of the proxy components. So it can prevent external malicious attackers from covering the Activity interface. This scheme is anylyzed from the perspective of Activity hijack attack process, designs interception means to prevent the occurrence of Activity hijack. Experimental results show that our method is available and effective to provide safe and reliable operation environment for the application. What's more, it don't change the kernel of android and can ensure the application from the attacks of Activity hijack.

Key words: security container, hijacked fishing, malicious attacks

CLC Number: