Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/55012
Title: | Automated security certification of Android application | Authors: | Tay, Chee Yang | Keywords: | DRNTU::Engineering::Computer science and engineering::Information systems::Information systems applications | Issue Date: | 2013 | Abstract: | Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications(app) to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applications will do with their data, and thereby cannot decide what permissions such applications should run with. Thus with the increasing sales Android powered devices, better security is required to keep up with the growing trend. The first part of the report examines the structure and characteristic of some common malwares found in Android applications and provides findings on these malware. Analysis were made by either researching on the works of other researchers in the field or decompiling the malware file to study its source codes and structure. Using these knowledge, new findings were inferred and are mainly focusing on the trigger of attacks and impacts that these malware have on the infected Android device and their owner. The second part of the report describes the concept of a collaborative environment for detection of malicious application and gathering data for analysis of malicious activities or emerging threats. The concept of identifying malicious activities from Hyper-Text Transfer Protocol(HTTP) traces can be done by creating a dependency graph to visualize the relations between the traces and using this graph, analysis can be made to identify any malicious activities that could have existed based on the relationship among them. This report is useful for other researchers to learn about the trigger of attacks and impact of the malwares analyzed in this project. This report also demonstrate the concept of collaborative environment on its efficiency and the type of attacks that this kind of environment can help to discovers. | URI: | http://hdl.handle.net/10356/55012 | Schools: | School of Computer Engineering | Research Centres: | Forensics and Security Lab | Rights: | Nanyang Technological University | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYP report.pdf Restricted Access | 866.13 kB | Adobe PDF | View/Open |
Page view(s) 50
446
Updated on Mar 28, 2024
Download(s) 50
32
Updated on Mar 28, 2024
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.