Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/9213
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nair, Krishnendu | - |
dc.date.accessioned | 2020-07-23T07:55:16Z | - |
dc.date.available | 2020-07-23T07:55:16Z | - |
dc.date.issued | 2019-06-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/9213 | - |
dc.description.abstract | Android’s security is one of the hot research topic in current days. This is mainly due to leakage of user’s privacy information from third party apps on mobile. Even after permission model defined by Android we all are witnessing leakage of our critical information. This is mainly due to (1) Permission model is proportionally coarse granular (2) Insufficient knowledge of user make him approve over-claim permission mistakenly. Henceforth this paper focus in recognizing dangerous over-claim permission. This starts with describing permission model,over-claim permission and some of the dangerous over-claim permission which is described. This work specifically propose an algorithm to detect signature of dangerous permission incorporated during upgrading version of third-party software. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 17MCEI08; | - |
dc.subject | Computer 2017 | en_US |
dc.subject | Project Report 2017 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 17MCEI | en_US |
dc.subject | 17MCEI08 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2017 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Detecting over-claim permission and recognizing dangerous permission using static analysis in Android apps | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
17MCEI08.pdf | 17MCEI08 | 1.1 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.