Automatic POC generation of Android app vulnerability

Mobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if...

Full description

Saved in:
Bibliographic Details
Main Author: Leow, Dexter Ze Wei
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/149039
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-149039
record_format dspace
spelling sg-ntu-dr.10356-1490392021-05-25T01:18:06Z Automatic POC generation of Android app vulnerability Leow, Dexter Ze Wei Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering Mobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if certain vulnerabilities are present by reading the source code of the application. If such vulnerabilities are present, AndroidXploit will then automatically exploit these vulnerabilities. The source code is reversed engineered using Apktool, and the vulnerabilities are exploited using tools such as Android Debug Bridge and John the Ripper. AndroidXploit is tested on several popular applications and have successfully exploited some of the vulnerabilities present in these applications. Bachelor of Engineering (Computer Science) 2021-05-25T01:18:06Z 2021-05-25T01:18:06Z 2021 Final Year Project (FYP) Leow, D. Z. W. (2021). Automatic POC generation of Android app vulnerability. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/149039 https://hdl.handle.net/10356/149039 en SCSE20-0201 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Leow, Dexter Ze Wei
Automatic POC generation of Android app vulnerability
description Mobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if certain vulnerabilities are present by reading the source code of the application. If such vulnerabilities are present, AndroidXploit will then automatically exploit these vulnerabilities. The source code is reversed engineered using Apktool, and the vulnerabilities are exploited using tools such as Android Debug Bridge and John the Ripper. AndroidXploit is tested on several popular applications and have successfully exploited some of the vulnerabilities present in these applications.
author2 Liu Yang
author_facet Liu Yang
Leow, Dexter Ze Wei
format Final Year Project
author Leow, Dexter Ze Wei
author_sort Leow, Dexter Ze Wei
title Automatic POC generation of Android app vulnerability
title_short Automatic POC generation of Android app vulnerability
title_full Automatic POC generation of Android app vulnerability
title_fullStr Automatic POC generation of Android app vulnerability
title_full_unstemmed Automatic POC generation of Android app vulnerability
title_sort automatic poc generation of android app vulnerability
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/149039
_version_ 1701270458564870144