
Description
Despite the more tightly controlled permissions and Java framework used by most programs in the Android operating system, an attacker can use the same classic vulnerabilities that exist for traditional Linux binaries on the programs in the Android operating system. Some classic vulnerabilities include stack overows, string formats, and heap meta-information corruption.
Download count: 0
Details
Contributors
- Gibbs, Wil (Author)
- Doupe, Adam (Thesis director)
- Shoshitaishvili, Yan (Committee member)
- Barrett, The Honors College (Contributor)
- Computer Science and Engineering Program (Contributor)
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2018-12
Subjects
Resource Type
Collections this item is in