Abstract
Since Android is open, as many as people begin to pay close attention to Android, such as the program developer, the users. In this paper, on the basis of an Android application program, we expound the basic characteristics of the Activity, Including the life cycle of Activity. According to the characteristics of the Activity, we focus on explaining the management mechanism and the switch bug of the Activity. At the end we describe the exploits of the Activity and finish the Activity hijack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Developers A. What is android?, Feb. 2011. http://developer.android.com/guide/basics/what-is-android.html
Wang, R., Jiang, Z., Liu, Q.: Under the android binder inter-process communication mechanism analysis and research. Comput. Technol. Dev. 9, 107–110 (2012)
Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. USENIX Security Symposium (2011)
Brahler, S.: Analysis of the android architecture. Karlsruhe Institute for Technology (2010)
Alliance OH. Android overview. http://www.openhandsetalliance.com. Accessed 8 Oct 2007
Chen, L., Zhang, C.: Design and implement of binder extension model based on android inter-process communication. J. Xi’an Univ. Post Telecom 18(3), 96–99 (2013)
Developers A. The activity lifecycle. http://developer.android.com/intl/de/reference/android/app/Activity.html. Accessed Aug 2010
Duan, L.: In-depth analyze android activity. The new technology and new products of China, 16: 034 (2011)
Ongtang, M., McLaughlin, S., Enck, W., et al.: Semantically rich application-centric security in android. Secur. Commun. Netw. 5(6), 658–673 (2012)
Felt, A.P., Chin, E., Hanna, S., et al.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627–638. ACM (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, Y., Li, Y., Yuan, F., Zhang, F. (2014). Hijacking Activity Technology Analysis and Research in Android System. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)