Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/590
Full metadata record
DC FieldValueLanguage
dc.contributor.authorABDELKADER-KHAROUBI, MOhamed YAssine-
dc.date.accessioned2023-10-22T08:07:17Z-
dc.date.available2023-10-22T08:07:17Z-
dc.date.issued2023-
dc.identifier.urihttps://repository.esi-sba.dz/jspui/handle/123456789/590-
dc.descriptionEncadrant : Pr Amar Djamel BENSABER / Co-Encadrant : Pr Djamel-Abdelhak SERIAIen_US
dc.description.abstractAbstract : Mobile apps are indispensable in our daily routines, serving as portals to information, communication, entertainment, and myriad other services. However, as many of these apps amass a wealth of our sensitive data, encompassing personal, financial, and social media details, they’ve evolved into prime targets for hackers. This surge of attention for mobile applications has escalated mobile vulnerabilities notably. In this study, we conduct a comprehensive study for state-of-the-art approaches for reverse engineer mobile applications, vulnerability detection and remediation. Critically analyze their limitations and provide a detailed comparison between these approaches.en_US
dc.language.isoenen_US
dc.subjectStatic Analysisen_US
dc.subjectReverse Engineeringen_US
dc.subjectSoftware Securityen_US
dc.subjectMobile Developmenten_US
dc.subjectMobile Vulnerabilitiesen_US
dc.titleRemédiation/Correction Automatique de Code Source pour la Sécurité et la Confidentialité de Tierce Applications Mobilesen_US
dc.typeThesisen_US
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
master_final-1-1.pdf51,35 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.