Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Other Computer Engineering

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird Nov 2019

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird

Student Works

Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …