Show simple item record

dc.contributor.authorGalli, Enrico
dc.date.accessioned2014-03-04T20:35:47Z
dc.date.available2014-03-04T20:35:47Z
dc.date.issued2012-08
dc.identifier.othergalli_enrico_201208_ms
dc.identifier.urihttp://purl.galileo.usg.edu/uga_etd/galli_enrico_201208_ms
dc.identifier.urihttp://hdl.handle.net/10724/28271
dc.description.abstractAndroid is the fastest growing mobile platform. This market growth has attracted malware authors. For example, in 2011, the number of malware applications targeting Android more than doubled. However, while the number of malware applications has increased, there has not been a corresponding growth in the number of tools which can be used to analyze Android applications. In this thesis we attempt to fill some of the holes in reverse engineer’s toolkit. To achieve this goal, we opted to provided a formalized process for extracting and packaging Android applications, a novel technique which enables engineers to debug applications at the bytecode-level, and a dynamic taint analysis based approach for correlating inbound with outbound network packets.
dc.languageeng
dc.publisheruga
dc.rightspublic
dc.subjectAndroid
dc.subjectDalvik
dc.subjectDebugger
dc.subjectMobile
dc.subjectReverse Engineering
dc.subjectSecurity
dc.titleReverse engineering Android applications
dc.typeThesis
dc.description.degreeMS
dc.description.departmentComputer Science
dc.description.majorComputer Science
dc.description.advisorKang Li
dc.description.committeeKang Li
dc.description.committeeLakshmish Ramaswamy
dc.description.committeeRoberto Perdisci


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record