Show simple item record

dc.contributor.authorMinh, Dang Ba
dc.date.accessioned2018-01-13T03:37:20Z
dc.date.accessioned2018-05-17T03:57:21Z
dc.date.available2018-01-13T03:37:20Z
dc.date.available2018-05-17T03:57:21Z
dc.date.issued2014
dc.identifier.other022003563
dc.identifier.urihttp://10.8.20.7:8080/xmlui/handle/123456789/2125
dc.description.abstractThe number of Android devices on the market is increasing and so is its user base. Malware authors see opportunities in this increase of Android devices by the means of economical profit, stealing private information or simply controlling devices. Lately, this threat has escalated. In order to prevent malicious applications from spreading, several analysis tools have been released, introducing static analysis of Android packages. As of yet, there is no dynamic analysis tool publicly available. Therefore, this thesis project aims at understanding an Android application sandbox system with the intent to provide an initial understanding of the behavior of unknown packages through analysis during runtime. By utilizing dynamic taint analysis to detect data leakage and inserting API hooks using physical modification of the Android framework, several interesting and potentially harmful operations performed by a package can be detected. Additionally, to get an overview of the operations performed during runtime, an analysis report is generated, much like the ones in traditional sandboxes. Furthermore, by visualizing the package behavior can facilitate in the interpretation of text-based reports as well as determining similarity between analyzed packages.en_US
dc.description.sponsorshipPHD. Pham Van Hauen_US
dc.language.isoen_USen_US
dc.publisherInternational University - HCMCen_US
dc.subjectAdroid applicationen_US
dc.titleInformation flow tracking on taintdroiden_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record