Essays about: "Malicious Apps"

Found 4 essays containing the words Malicious Apps.

  1. 1. Ethical Hacking of Android Auto in the Context of Road Safety

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Palm; Benjamin Gafvelin; [2021]
    Keywords : Android Auto Security; Infotainment System; Road Safety; Penetration Testing; Malicious Apps; Android Security; ; Android Auto Säkerhet; Infotainment-system; Vägsäkerhet; Penetrationstest; Skadliga Appar; Android Säkerhet; ;

    Abstract : With a more than ever increasing demand to interconnect smartphones with infotainment systems, Android Auto has risen in popularity with its services used in modern vehicles worldwide. However, as users progressively connect their smartphones to in-vehicle infotainment systems, the opportunity for malicious actors to endanger and access private data of Android Auto users advances as well. READ MORE

  2. 2. Permission Based Risk Assessment for Enhancing Privacy of Android Users

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Muhammad Rashid Idris; [2018]
    Keywords : Android; Mobile apps; Privacy; Risk assessment; Principle of Least Privilege; EBIOS; Android; Mobila appar; Integritet; Riskbedömningsmetoden; Princip om lägst privilegium; EBIOS;

    Abstract : Mobile applications tend to access data beyond their intended functionality and share this data with third parties for various purposes including marketing, profiling and advertisement. This data also includes user’s personal information and access to this personal information without user’s consent put user’s privacy at risk. READ MORE

  3. 3. EzMole: A new prototype for securing public Wi-Fi connections

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Rickard Karlsson; [2017]
    Keywords : EzMole; Wi-Fi; wifi; Internet of Things; IoT; security; vulnerability assessment; access point; Internet; public Wi-Fi;

    Abstract : When public Wi-Fi networks are being used, it can be hard to know who else that is using the same network or is monitoring the traffic that is traveling across the network. If the network is public and unencrypted anyone can monitor the traffic and to use these networks for work can be very risky. READ MORE

  4. 4. The System Design of Mobile Application Crawler and The Implement of Some Key Technologies

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Hao Li; [2016]
    Keywords : ;

    Abstract : Smartphones have become ubiquitous in people's daily lives, due to their pervasive- ness, continuous connectivity to the Internet and significant computational power. And mobile applications have played a role as an entry point for people to access a mobile network. READ MORE