Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/76171
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChe, Calvin Zi Yi
dc.date.accessioned2018-11-22T12:48:24Z
dc.date.available2018-11-22T12:48:24Z
dc.date.issued2018
dc.identifier.urihttp://hdl.handle.net/10356/76171
dc.description.abstractAndroid malware is a problem which users of the mobile operating system had to contend with. This project analysed 16 vulnerabilities from the Android framework to learn how to exploit them and developed proof-of-concept exploits for each of the vulnerabilities. The exploits were reverse engineered into Smali code using Apktool, and YARA rules were created based on unique patterns in Smali code to identify similar exploits. 82,389 published Android packages in the Google Play Store were then reverse engineered and scanned using Apktool and YARA using the rules created. The results from this project would be used for future Android vulnerability research.en_US
dc.format.extent75 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Computer science and engineering::Software::Operating systemsen_US
dc.titleAnalysis and identification of Android vulnerabilities and exploitsen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorLiu Yangen_US
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
SCE17-0631-Report.pdf
  Restricted Access
2.05 MBAdobe PDFView/Open

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.