Show simple item record

dc.contributor.advisorΛαμπρινουδάκης, Κωνσταντίνος
dc.contributor.authorΜάντος, Πέτρος Λάζαρος Κάρολος
dc.contributor.authorMantos, Petros Lazaros Karolos
dc.contributor.authorΜπουκικάς, Ευστάθιος
dc.contributor.authorBoukikas, Efstathios
dc.date.accessioned2018-01-26T10:39:55Z
dc.date.available2018-01-26T10:39:55Z
dc.date.issued2017
dc.identifier.urihttp://dione.lib.unipi.gr/xmlui/handle/unipi/10936
dc.format.extent108el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleVulnerability tester: an Android app which finds and exploits application layer vulnerabilities of other appsel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENAndroid is the most popular mobile operating system. Nowadays, it is used not only in smartphones but can be found at the heart of each smart device. This makes it one of the most popular targets amongst malware developers and cyber criminals. The main purpose of this dissertation is to examine possible application layer vulnerabilities that lie both in Android application components and its architecture. This was not only accomplished theoretically but also by developing from scratch an Android application which can be used in order to detect, exploit and inform the end-user regarding such vulnerabilities. Firstly, the reader will be introduced to security-oriented structures of the Android’s ecosystem and application architecture. Then, the most significant Android application components will be discussed in order to illustrate with clarity their role in the application’s lifecycle while some prominent exploitation techniques applicable to them will also be explained. Finally, some of the core capabilities of the aforementioned application will be demonstrated by exploiting a proof of concept vulnerable application. The dissertation concludes with some secure coding practices that should be taken into account in order to eliminate these kind of vulnerabilities.el
dc.contributor.masterΑσφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordAndroid (Electronic resource)el
dc.subject.keywordSecurityel
dc.subject.keywordPenetration testingel


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Except where otherwise noted, this item's license is described as
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Contact Us
Send Feedback
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»