Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLeow, Dexter Ze Weien_US
dc.identifier.citationLeow, D. Z. W. (2021). Automatic POC generation of Android app vulnerability. Final Year Project (FYP), Nanyang Technological University, Singapore.
dc.description.abstractMobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if certain vulnerabilities are present by reading the source code of the application. If such vulnerabilities are present, AndroidXploit will then automatically exploit these vulnerabilities. The source code is reversed engineered using Apktool, and the vulnerabilities are exploited using tools such as Android Debug Bridge and John the Ripper. AndroidXploit is tested on several popular applications and have successfully exploited some of the vulnerabilities present in these applications.en_US
dc.publisherNanyang Technological Universityen_US
dc.subjectEngineering::Computer science and engineeringen_US
dc.titleAutomatic POC generation of Android app vulnerabilityen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorLiu Yangen_US
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
Leow Ze Wei Dexter FYP Final Report.pdf
  Restricted Access
718.63 kBAdobe PDFView/Open

Page view(s)

Updated on Jul 2, 2022

Download(s) 50

Updated on Jul 2, 2022

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.