Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we fo...
محفوظ في:
المؤلف الرئيسي: | |
---|---|
التنسيق: | text |
اللغة: | English |
منشور في: |
Institutional Knowledge at Singapore Management University
2016
|
الموضوعات: | |
الوصول للمادة أونلاين: | https://ink.library.smu.edu.sg/etd_coll_all/3 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1004&context=etd_coll_all |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|