Detecting applications with excessive privileges and applications vulnerable to privilege escalation attack in android
The rapid growth of capabilities and various services provided by smartphones transformed this device to a repository of private data and important resources and consequently an attractive target for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly g...
Saved in:
Main Author: | Kashefi, Iman |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/34602/1/ImanKashefiMFC2013.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The application of privileged wills in Malaysia and other selected countries : a comparative analysis /
by: Faridah binti Hussain -
Escalation and de-escalation of commitment /
by: Heng, Cheng Suang
Published: (2000) -
Inference binary search algorithm for blind timing-based attack in MYSQL injector vulnerability checker tool
by: Deria Liban, Abdilahi
Published: (2012) -
An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacks
by: Idris, Mohd. Yazid
Published: (2008) -
Bluetooth vulnerabilities on smart phones running in ios and android operating system
by: Fatani, Tariq Abdulaziz D.,
Published: (2013)