Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Android Third-Party Library Detection, Brody Concannon Jan 2019

Android Third-Party Library Detection, Brody Concannon

Creative Components

Third-party library analysis research is important to many research fields like program analysis, clone-detection, security and privacy. There are many considerations taken when developing a third-party library analysis approach. The approach must be resilient to common obfuscation techniques and be able to determine similarity between two libraries with a high level of confidence. This paper explores this research and the problems that have been solved and reviews the improvements and shortcomings within the third-party library analysis field.


An Investigative Study On Android Verified Boot Process, Brett Weiss Jan 2019

An Investigative Study On Android Verified Boot Process, Brett Weiss

Creative Components

No abstract provided.


A Dynamic Taint Forensic Analysis Tool For Android Apps, Zhen Xu Jan 2017

A Dynamic Taint Forensic Analysis Tool For Android Apps, Zhen Xu

Graduate Theses and Dissertations

Mobile digital forensic faces numerous problems including a huge amount of data, growing amount of applications and usage of encryption or obfuscation. As a result, data of interest is hard to locate. The traditional method uses predefined pattern searching algorithm. Such technique can dig out much information but cannot find information embedded with normal data such as a barcode in an image or encryption. This project intends to develop a tool which facilitates the investigation process by answering what information could exist in a certain file. With the assistance, the investigator can focus on the content of some interesting files ...


Man-Machine Partial Program Analysis For Malware Detection, Thomas Norman Deering Jan 2015

Man-Machine Partial Program Analysis For Malware Detection, Thomas Norman Deering

Graduate Theses and Dissertations

With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the accompanying proliferation of malware. Existing work addresses the area of consumer malware detection, but cannot detect novel, sophisticated, domain-specific malware that is targeted specifically at one aspect of an organization (eg. ground operations of the US Military). Adversaries can exploit domain knowledge to camoflauge malice within the legitimate behaviors of an app and behind a domain-specific trigger, rendering traditional approaches such as signature-matching, machine learning, and dynamic monitoring ineffective. Manual code inspections are also inadequate, scaling poorly and introducing human error. Yet ...


Droidspotter: A Forensic Tool For Android Location Data Collection And Analysis, Jeffrey Alan Kramer Jan 2013

Droidspotter: A Forensic Tool For Android Location Data Collection And Analysis, Jeffrey Alan Kramer

Graduate Theses and Dissertations

Since the surge in popularity of Android smartphones, creating Android applications and using location data in these applications have soared. Due to how quickly Android applications are being created, it is difficult for companies who have created forensics tools to keep updating their programs in a timely manner for investigators to use. This has created a need for a forensics tool which allows forensic investigators to analyze a new Android application themselves since, in most cases, criminal investigations are a time sensitive matter. The purpose of this research is to introduce a prototype for a tool which would allow investigators ...