Please use this identifier to cite or link to this item:
Title: Automatic POC generation of Android app vulnerability
Authors: Leow, Dexter Ze Wei
Keywords: Engineering::Computer science and engineering
Issue Date: 2021
Publisher: Nanyang Technological University
Source: Leow, D. Z. W. (2021). Automatic POC generation of Android app vulnerability. Final Year Project (FYP), Nanyang Technological University, Singapore.
Project: SCSE20-0201
Abstract: Mobile applications have played a huge part in our daily lives, providing convenience for the application users. However, these applications also brought significant risks to the users through the exploitation of various vulnerabilities. This report proposes a tool, AndroidXploit, that detects if certain vulnerabilities are present by reading the source code of the application. If such vulnerabilities are present, AndroidXploit will then automatically exploit these vulnerabilities. The source code is reversed engineered using Apktool, and the vulnerabilities are exploited using tools such as Android Debug Bridge and John the Ripper. AndroidXploit is tested on several popular applications and have successfully exploited some of the vulnerabilities present in these applications.
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
Leow Ze Wei Dexter FYP Final Report.pdf
  Restricted Access
718.63 kBAdobe PDFView/Open

Page view(s)

Updated on Jun 30, 2022

Download(s) 50

Updated on Jun 30, 2022

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.