Diplomová práca
Zraniteľnosti a forenzná analýza smartfónov na platforme Android
Riešiteľ: Ján Paraska
Vedúci: doc. RNDr. Jozef Jirásek, PhD.
Pracovisko: ÚINF
Ciele
  1. Analýza známych útokov na implementácie systému Android
  2. Klasifikácia a charakteristika zraniteľností smartfónov na platforme Android
  3. Možnosti a postupy forenznej analýzy smartfónov na tejto platforme
Popis a tématika
Vyšpecifikovanie najčastejších problémov, resp. nedostatkov v implementáciu OS Android vzhľadom na známe a akutálne útoky.
Klasifikácia zistených zraniteľností a ich prípadné závislosti na hardware spjená s doporučením možnej prevencie či opatrení.
Zdroje
  1. Rashidi, B., Fung, C., A Survey of Android Security Threats and Defenses, Virginia Commonwealth University, Richmond, Virginia, USA
  2. Kireet, .M, Rao, M., S., A Survey on Malware Attacks on Smartphones, International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3002-3004
  3. Raveendranath, R., Venkiteswaran R, Babu, A., J., Android Malware Attacks and Countermeasures: Current and Future Directions, College of Engineering, Trivandrum, India
  4. Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M., S., Conti, M., Rajarajan, M., Android Security: A Survey of Issues, Malware Penetration, and Defenses
  5. Casey, E., Digital Evidence and Computer Crime, Forensic Science, Computers and the Internet, 2011, Elsevier Inc., ISBN 9780123742674
  6. Spreitzenbarth, M., Dissecting the Droid: Forensic Analysis of Android and its malicious Applications, Erlangen, 2013
  7. Suarez-Tangil, G., Tapiador, J., E., Peris-Lopez, P., Ribagorda, A., Evolution, Detection and Analysis of Malware for Smart Devices
  8. Manjunath, V., Reverse Engineering Of Malware On Android, SANS Institute, 2011
Diplomová práca
Diplomová práca
Zdroje
  • [1] RASHIDI, B. FUNG, C. 2015. A Survey of Android Security Threats and Defenses: výskumná správa. Richmond, Virginia, USA: Virginia Commonwealth University, 2015. 33s
  • [2] FARUKI, P. BHARMAL, A. LAXAMI, V. GANMOOR, V. GAUR, M. S. CONTI, M. RAJARAJAN, M. 2015. Android Security: A Survey of Issues, Malware Penetration, and Defenses. In IEEE Communications Surveys & Tutorials [online]. 2015, vol. 17, no. 2. [cit 2017-12-29]. DOI: 10.1109/2386139
  • [3] TAM, K. FEIZOLLAH, A. ANUAR, N. B. SALLEH, R. CAVALLARO, L. 2017. The Evolution of Android Malware and Android Analysis Techniques. In ACM Comput. Surv. [online]. 2017, vol. 49, no. 4. [cit 2017-11-01]. DOI: 10.1145/3017427
  • [4] RANGWALA, M. ZHANG, P. ZOU, X. LI, F. 2014. A taxonomy of privilege escalation attacks in Android applications. Int. J. Security and Networks. [online]. 2014, vol. 9, no. 1. [cit 2018-01-09].
  • [5] WU, J. CUI, T. BAN, T. GUO, S. CUI, L. 2015. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications [online]. 2015, Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1179 [cit 28.11.2017]
Aktualizácia
11.01.2018