Detecting applications with excessive privileges and applications vulnerable to privilege escalation attack in android
The rapid growth of capabilities and various services provided by smartphones transformed this device to a repository of private data and important resources and consequently an attractive target for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly g...
| Auteur principal: | Kashefi, Iman |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/34602/1/ImanKashefiMFC2013.pdf |
Documents similaires
An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacks
par: Idris, Mohd. Yazid
Publié: (2008)
par: Idris, Mohd. Yazid
Publié: (2008)
Bluetooth vulnerabilities on smart phones running in ios and android operating system
par: Fatani, Tariq Abdulaziz D.
Publié: (2013)
par: Fatani, Tariq Abdulaziz D.
Publié: (2013)
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
par: Al-Araji, Zaid Jasim Mohammed
Publié: (2023)
par: Al-Araji, Zaid Jasim Mohammed
Publié: (2023)
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
par: Aminordin, Azmi
Publié: (2021)
par: Aminordin, Azmi
Publié: (2021)
Android malware analysis using application permissions
par: Hamadi, Zaid Khalid
Publié: (2015)
par: Hamadi, Zaid Khalid
Publié: (2015)
Impact of extended and restricted antibiotic de-escalation on mortality
par: Lin, Teh Hwei
Publié: (2020)
par: Lin, Teh Hwei
Publié: (2020)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
par: Hydara, Isatou
Publié: (2024)
par: Hydara, Isatou
Publié: (2024)
Android application for colorblind people and its usability testing
par: Nasrmalek, Shahab
Publié: (2014)
par: Nasrmalek, Shahab
Publié: (2014)
ASEAN strategies for the prevention of escalating conflict over the Spratly Islands
par: Kim, Jinwon
Publié: (2013)
par: Kim, Jinwon
Publié: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
An android application for : MYBAS / Fatin Ain Najwa Che Hashim
par: Che Hashim, Fatin Ain Najwa
Publié: (2018)
par: Che Hashim, Fatin Ain Najwa
Publié: (2018)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
par: Shakhatreh, Ala' Yaseen Ibrahim
Publié: (2010)
par: Shakhatreh, Ala' Yaseen Ibrahim
Publié: (2010)
Botnet traffic detection on android operating system
par: Abang Abdul Rasyid Abang Yusop
Publié: (2013)
par: Abang Abdul Rasyid Abang Yusop
Publié: (2013)
Permission extraction framework for android malware detection
par: Ghasempour, Ali
Publié: (2019)
par: Ghasempour, Ali
Publié: (2019)
Android malware detection with ensemble of androidmanifest features
par: Mohammad Salehi, .
Publié: (2019)
par: Mohammad Salehi, .
Publié: (2019)
Mobile GIS data collection using android applications / Noorfatekah Talib
par: Talib, Noorfatekah
Publié: (2014)
par: Talib, Noorfatekah
Publié: (2014)
Developing secure android application with encrypted database file using sqlcipher
par: Rachmawan, Ardiansa
Publié: (2014)
par: Rachmawan, Ardiansa
Publié: (2014)
Analysis Of Yttrium Iron Garnet (Yig) Resonator With Excess Fe2o3 For Wideband Antenna Applications
par: Othman, Mohamadariff
Publié: (2015)
par: Othman, Mohamadariff
Publié: (2015)
Barcode and its potential application in construction
par: Hussin, Balqis
Publié: (2012)
par: Hussin, Balqis
Publié: (2012)
Behaviour analysis and development of the detection algorithm and application prototype to detect the presence of the premium short message service(SMS) abusers malware on the android platform
par: Syed Mohd Hazrul Syed Salim
Publié: (2013)
par: Syed Mohd Hazrul Syed Salim
Publié: (2013)
Analysis of web worm attack on web application
par: Mohd. Ghazzali, Amalina
Publié: (2008)
par: Mohd. Ghazzali, Amalina
Publié: (2008)
Propagation measurements and prediction for indoor wlan application
par: Aboharba, Ibrahim M. Abdalla
Publié: (2006)
par: Aboharba, Ibrahim M. Abdalla
Publié: (2006)
Contractors's application of extension of time in PAM 1998
par: Azmi, Afisza Irfan
Publié: (2009)
par: Azmi, Afisza Irfan
Publié: (2009)
Application of SIFLC for boost converter using FPGA
par: Taeed, Fazel
Publié: (2010)
par: Taeed, Fazel
Publié: (2010)
Application portfolio management : framework and operational tool
par: Adeli, Ali Mahdavi
Publié: (2010)
par: Adeli, Ali Mahdavi
Publié: (2010)
Applicability of GIS database to customary land development
par: Christiana, Eyetan
Publié: (2009)
par: Christiana, Eyetan
Publié: (2009)
Detection and prevention for SQL injection attacks in stored procedures using real time web application
par: Salih Ali, Nabeel
Publié: (2015)
par: Salih Ali, Nabeel
Publié: (2015)
A security framework for mobile health applications on android platform / Muzammil Hussain
par: Muzammil , Hussain
Publié: (2017)
par: Muzammil , Hussain
Publié: (2017)
Application of H infinity to active suspension control system
par: Shirdel, Amir Hossein
Publié: (2010)
par: Shirdel, Amir Hossein
Publié: (2010)
Enhancement of automated black-box web application vulnerability assessment algorithms
par: Lim, Kah Seng
Publié: (2019)
par: Lim, Kah Seng
Publié: (2019)
Application of the runge-kutt discretization method on an optimal control problem
par: Baharin, Haslinda
Publié: (2013)
par: Baharin, Haslinda
Publié: (2013)
Application of real time optimisation for fatty acid fractionation process
par: Lee, Hock Weng
Publié: (2005)
par: Lee, Hock Weng
Publié: (2005)
Application of quality function deployment in moulded fibre packaging design
par: Zalil, Shahly Azly
Publié: (2006)
par: Zalil, Shahly Azly
Publié: (2006)
Application of artificial neural network in two dimensional warranty modelling
par: Ang, Jun Chin
Publié: (2011)
par: Ang, Jun Chin
Publié: (2011)
Application of strategic facilities maintenance planning in collaborating with procurement strategy
par: Mohd. Shah, Anas
Publié: (2011)
par: Mohd. Shah, Anas
Publié: (2011)
Causes of delay in the processing of land application for state land in Sabah
par: Liew, Bernard Chau Min
Publié: (2007)
par: Liew, Bernard Chau Min
Publié: (2007)
Isolation and application of violet pigment extracted from Chromobacterium violaceum
par: Yusof, Nur Zulaikha
Publié: (2010)
par: Yusof, Nur Zulaikha
Publié: (2010)
Applications of semiconductor optical amplifier for future all-optical networks
par: Mahad, Farah Diana
Publié: (2012)
par: Mahad, Farah Diana
Publié: (2012)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
par: Abdul Razak, Aina Nabila
Publié: (2019)
par: Abdul Razak, Aina Nabila
Publié: (2019)
Documents similaires
-
An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacks
par: Idris, Mohd. Yazid
Publié: (2008) -
Bluetooth vulnerabilities on smart phones running in ios and android operating system
par: Fatani, Tariq Abdulaziz D.
Publié: (2013) -
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
par: Al-Araji, Zaid Jasim Mohammed
Publié: (2023) -
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
par: Aminordin, Azmi
Publié: (2021) -
Android malware analysis using application permissions
par: Hamadi, Zaid Khalid
Publié: (2015)