Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Singapore Management University

Theses/Dissertations

Mobile

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Techniques For Identifying Mobile Platform Vulnerabilities And Detecting Policy-Violating Applications, Mon Kywe Su Oct 2016

Techniques For Identifying Mobile Platform Vulnerabilities And Detecting Policy-Violating Applications, Mon Kywe Su

Dissertations and Theses Collection

Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we focus on security and vulnerability analysis of framework and application layers. Security mechanisms, such as Android’s sandbox and permission systems, exist in framework layer, while malware scanners protects application layer. However, there are rooms for improvement in both mechanisms. For instance, Android’s permission system is known to be implemented in ad-hoc manner and not well-tested for vulnerabilities. Application layer also focuses …


Using User Saliency For Effective Oled Display Power Management, Kiat Wee Tan Jan 2014

Using User Saliency For Effective Oled Display Power Management, Kiat Wee Tan

Dissertations and Theses Collection (Open Access)

The display component on mobile device has always been a main power drain compared to networking and processing components. Even with advancement in display technology such as Organic Light Emitting Diodes (OLED) displays to help reduce this cost, the increasing display size and new mobile usage paradigm (App stores and Social networking), the display still remains as the largest power drain component. In this thesis, we describe an approach to reduce power consumption on OLED display by dimming areas of the screen that the user might not be interested in. We determine these uninteresting areas by reviewing large number applications …


Exploiting Human Factors In User Authentication, Payas Gupta Jan 2013

Exploiting Human Factors In User Authentication, Payas Gupta

Dissertations and Theses Collection (Open Access)

Our overarching issue in security is the human factor – and dealing with it is perhaps one of the biggest challenges we face today. Human factor is often described as the weakest part of a security system and users are often described as the weakest link in the security chain. In this thesis, we focus on two problems which are caused by human factors in user authentication and propose respective solutions. a) Secrecy information inference attack – publicly available information can be used to infer some secrecy information about the user. b) Coercion attack – where an attacker forces a …