Search for dissertations about: "malware"

Showing result 1 - 5 of 7 swedish dissertations containing the word malware.

  1. 1. MobiLeak Security and Privacy of Personal Data in Mobile Applications

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Pasquale Stirparo; KTH.; [2015]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; mobile application; security; privacy; android; forensics; malware; Informations- och kommunikationsteknik; Information and Communication Technology; Datalogi; Computer Science;

    Abstract : Smartphones and mobile applications have become an essential part of our daily lives. People always carry their smartphones with them and rely on mobile applications for most of their tasks: from checking emails for personal or business purposes, to engaging in social interactions via social networks, from trading online or checking their bank accounts to communicating with families and friends through instant messaging applications. READ MORE

  2. 2. Privacy-Invasive Software Exploring Effects and Countermeasures

    University dissertation from Ronneby : Blekinge Institute of Technology

    Author : Martin Boldt; Blekinge Tekniska Högskola.; [2007]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; privacy; malware; spyware;

    Abstract : As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. READ MORE

  3. 3. Mobile Device Security with ARM TrustZone

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Sileshi Demesie Yalew; KTH.; [2018]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Android; ARM TrustZone; Malware Mobile Devices; Mobile Security; Trusted Computing;

    Abstract : Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as nancial and healthcare institutions oer services to their clients using smartphone applications (apps). Many of these apps run on Android, the most adopted mobile operating system (OS) today. READ MORE

  4. 4. No Hypervisor Is an Island System-wide Isolation Guarantees for Low Level Code

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Oliver Schwarz; KTH.; [2016]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; DMA; Peripheral Devices; Instruction Set Architectures; ISA; Information Flow; Boot; Datalogi; Computer Science;

    Abstract : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. READ MORE

  5. 5. Scalable Dynamic Analysis of Binary Code

    University dissertation from Linköping : Linköping University Electronic Press

    Author : Ulf Kargén; Linköpings universitet.; Linköpings universitet.; [2019]

    Abstract : In recent years, binary code analysis, i.e., applying program analysis directly at the machine code level, has become an increasingly important topic of study. This is driven to a large extent by the information security community, where security auditing of closed-source software and analysis of malware are important applications. READ MORE