Skip to main content

Hijacking Activity Technology Analysis and Research in Android System

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Abstract

Since Android is open, as many as people begin to pay close attention to Android, such as the program developer, the users. In this paper, on the basis of an Android application program, we expound the basic characteristics of the Activity, Including the life cycle of Activity. According to the characteristics of the Activity, we focus on explaining the management mechanism and the switch bug of the Activity. At the end we describe the exploits of the Activity and finish the Activity hijack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Developers A. What is android?, Feb. 2011. http://developer.android.com/guide/basics/what-is-android.html

  2. Wang, R., Jiang, Z., Liu, Q.: Under the android binder inter-process communication mechanism analysis and research. Comput. Technol. Dev. 9, 107–110 (2012)

    Google Scholar 

  3. Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. USENIX Security Symposium (2011)

    Google Scholar 

  4. Brahler, S.: Analysis of the android architecture. Karlsruhe Institute for Technology (2010)

    Google Scholar 

  5. Alliance OH. Android overview. http://www.openhandsetalliance.com. Accessed 8 Oct 2007

  6. Chen, L., Zhang, C.: Design and implement of binder extension model based on android inter-process communication. J. Xi’an Univ. Post Telecom 18(3), 96–99 (2013)

    Google Scholar 

  7. Developers A. The activity lifecycle. http://developer.android.com/intl/de/reference/android/app/Activity.html. Accessed Aug 2010

  8. Duan, L.: In-depth analyze android activity. The new technology and new products of China, 16: 034 (2011)

    Google Scholar 

  9. Ongtang, M., McLaughlin, S., Enck, W., et al.: Semantically rich application-centric security in android. Secur. Commun. Netw. 5(6), 658–673 (2012)

    Article  Google Scholar 

  10. Felt, A.P., Chin, E., Hanna, S., et al.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627–638. ACM (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunlong Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, Y., Li, Y., Yuan, F., Zhang, F. (2014). Hijacking Activity Technology Analysis and Research in Android System. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics