Show simple item record

dc.contributor.advisorLin, Xiaodong
dc.contributor.authorTian, Di
dc.date.accessioned2016-04-13T15:24:34Z
dc.date.accessioned2022-03-29T17:33:56Z
dc.date.available2016-04-13T15:24:34Z
dc.date.available2022-03-29T17:33:56Z
dc.date.issued2016-01-01
dc.identifier.urihttps://hdl.handle.net/10155/641
dc.description.abstractAs being a representative mobile operating system in the world, Android OS has been part of users' daily life. Unfortunately, the rapid expansion of Android third-markets introduces malware aiming at Android applications at an alarming rate, which poses great threats to its users. Current research about the privacy leakage in Android mostly focuses on Activity, Service and Content Providers. Little attention has been paid to the vulnerability of Broadcast Receiver, which is expected to assist inter-component collaboration and facilitate component reutilization. In this thesis, we first present a detailed analysis on vulnerabilities of Broadcast Receiver. Then, we design and develop a Broadcast Receiver Vulnerability Detection (BRVD) system that examines such vulnerabilities, using a combination of semantic analysis and taint analysis. Furthermore, we perform experimental evaluation by analyzing 55 applications from Android third-markets using the proposed system; and 132 registered receivers are found with 11 vulnerable receivers being verified.en
dc.description.sponsorshipUniversity of Ontario Institute of Technologyen
dc.language.isoenen
dc.subjectAndroiden
dc.subjectBroadcast receiveren
dc.subjectTaint analysisen
dc.subjectSemantic analysisen
dc.subjectVulnerabilityen
dc.titleDetecting vulnerabilities of broadcast receivers in Android applicationsen
dc.typeThesisen
dc.degree.levelMaster of Science (MSc)en
dc.degree.disciplineComputer Scienceen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record