Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we fo...
Saved in:
Main Author: | SU, Mon Kywe |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/etd_coll_all/3 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1004&context=etd_coll_all |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Understanding the Genetic Makeup of Linux Device Drivers
by: Tschudin, Peter Senna, et al.
Published: (2013) -
SoFi: Reflection-augmented fuzzing for JavaScript engines
by: HE, Xiaoyu, et al.
Published: (2021) -
SGUARD: Towards fixing vulnerable smart contracts automatically
by: NGUYEN, Tai D., et al.
Published: (2021) -
Cerebro: Context-aware adaptive fuzzing for effective vulnerability detection
by: LI, Yuekang, et al.
Published: (2019) -
Web application vulnerability prediction using hybrid program analysis and machine learning
by: SHAR, Lwin Khin, et al.
Published: (2014)