Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Wayne State University

Security

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain Jan 2019

An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain

Wayne State University Theses

Security threats using intent based inter component communication (ICC) channels in Android are under constant scrutiny of software engineering researchers. Though prior research provides empirical evidence on the existence of collusive communication channels in popular android apps, little is known about developers’willful involvement and motivation to exploit these channels.To shed light on this matter, in this paper we devised a novel methodology to deterministically identify developers’ involvement in establishing collusive inter app communication channels. We incorporate static analysis and relational database technology to discover sensitive collusive channels and domain knowledge of the Android SDK to build a model to identify …


Opacity Of Discrete Event Systems: Analysis And Control, Majed Mohamed Ben Kalefa Jan 2013

Opacity Of Discrete Event Systems: Analysis And Control, Majed Mohamed Ben Kalefa

Wayne State University Dissertations

The exchange of sensitive information in many systems over a network can be manipulated

by unauthorized access. Opacity is a property to investigate security and

privacy problems in such systems. Opacity characterizes whether a secret information

of a system can be inferred by an unauthorized user. One approach to verify security

and privacy properties using opacity problem is to model the system that may leak confidential

information as a discrete event system. The problem that has not investigated

intensively is the enforcement of opacity properties by supervisory control. In other

words, constructing a minimally restrictive supervisor to limit the system's …


Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach, Nandan Garg Jan 2010

Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach, Nandan Garg

Wayne State University Dissertations

Most distributed systems comprise autonomous entities interacting with each other to achieve their objectives. These entities behave selfishly when making decisions. This behavior may result in strategical manipulation of the protocols thus jeopardizing the system wide goals. Micro-economics and game theory provides suitable tools to model such interactions. We use game theory to model and study three specific problems in distributed systems. We study the problem of sharing the cost of multicast transmissions and develop mechanisms to prevent cheating in such settings. We study the problem of antisocial behavior in a scheduling mechanism based on the second price sealed bid …