Security Analysis of Android Applications

dc.contributor.authorHuszti, Martin Zoltan
dc.contributor.departmentfi=Tietotekniikan laitos|en=Department of Computing|
dc.contributor.facultyfi=Teknillinen tiedekunta|en=Faculty of Technology|
dc.contributor.studysubjectfi=Tietotekniikka|en=Information and Communication Technology|
dc.date.accessioned2022-09-30T21:02:04Z
dc.date.available2022-09-30T21:02:04Z
dc.date.issued2022-09-20
dc.description.abstractNowadays, people can easily jump into learning programming on any platform they are interested in. It is the same with Android application development. However, security aspects during development are usually not considered in the first place. Sometimes testing an application's security has to be done in divergent environments and with different techniques, approaches, and tools. The more testing and investigation techniques used on an application; the more fields would be covered. Using static and dynamic analysis together can produce better security research coverage than using only one approach. The first and most important thing about cyber security is the theory. Developers must pay attention to many diverse parts of functions’ behaviors and be completely aware of the existing implementation of the built-in Android components. How can an Android application developer ensure that their application is not exposed to attackers? A feasible way to learn how to defend your application is to attempt to attack it. By examining penetration testing techniques, network monitoring, vulnerability showcases, and explanations, developers can answer how to find and take advantage of security weaknesses and threats in an application and how to come up with mitigations for it.
dc.format.extent83
dc.identifier.olddbid171638
dc.identifier.oldhandle10024/154737
dc.identifier.urihttps://www.utupub.fi/handle/11111/14413
dc.identifier.urnURN:NBN:fi-fe2022093060693
dc.language.isoeng
dc.rightsfi=Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.|en=This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|
dc.rights.accessrightsavoin
dc.source.identifierhttps://www.utupub.fi/handle/10024/154737
dc.subjectCyber Security, Android Application Development, Reverse Engineering, Static Analysis, Dynamic Analysis, Security Tools, Penetration Testing, Network Monitoring
dc.titleSecurity Analysis of Android Applications
dc.type.ontasotfi=Diplomityö|en=Master's thesis|

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
Huszti_Martin_Thesis.pdf
Size:
4.48 MB
Format:
Adobe Portable Document Format