Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/149039
Title: | Automatic POC generation of Android app vulnerability | Authors: | Leow, Dexter Ze Wei | Keywords: | Engineering::Computer science and engineering | Issue Date: | 2021 | Publisher: | Nanyang Technological University | Source: | Leow, D. Z. W. (2021). Automatic POC generation of Android app vulnerability. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/149039 | Project: | SCSE20-0201 | Abstract: | Mobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if certain vulnerabilities are present by reading the source code of the application. If such vulnerabilities are present, AndroidXploit will then automatically exploit these vulnerabilities. The source code is reversed engineered using Apktool, and the vulnerabilities are exploited using tools such as Android Debug Bridge and John the Ripper. AndroidXploit is tested on several popular applications and have successfully exploited some of the vulnerabilities present in these applications. | URI: | https://hdl.handle.net/10356/149039 | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Leow Ze Wei Dexter FYP Final Report.pdf Restricted Access | 718.63 kB | Adobe PDF | View/Open |
Page view(s)
232
Updated on Jun 30, 2022
Download(s) 50
30
Updated on Jun 30, 2022
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.