Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.
Download count: 0
- Partial requirement for: M.S., Arizona State University, 2014Note typethesis
- Includes bibliographical references (p. 91-94)Note typebibliography
- Field of study: Computer science