DC Field | Value | Language |
dc.contributor.author | ABDELKADER-KHAROUBI, MOhamed YAssine | - |
dc.date.accessioned | 2023-10-22T08:07:17Z | - |
dc.date.available | 2023-10-22T08:07:17Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/590 | - |
dc.description | Encadrant : Pr Amar Djamel BENSABER / Co-Encadrant : Pr Djamel-Abdelhak SERIAI | en_US |
dc.description.abstract | Abstract :
Mobile apps are indispensable in our daily routines, serving as portals to information, communication,
entertainment, and myriad other services. However, as many of these apps amass a wealth
of our sensitive data, encompassing personal, financial, and social media details, they’ve evolved
into prime targets for hackers. This surge of attention for mobile applications has escalated mobile
vulnerabilities notably. In this study, we conduct a comprehensive study for state-of-the-art
approaches for reverse engineer mobile applications, vulnerability detection and remediation. Critically
analyze their limitations and provide a detailed comparison between these approaches. | en_US |
dc.language.iso | en | en_US |
dc.subject | Static Analysis | en_US |
dc.subject | Reverse Engineering | en_US |
dc.subject | Software Security | en_US |
dc.subject | Mobile Development | en_US |
dc.subject | Mobile Vulnerabilities | en_US |
dc.title | Remédiation/Correction Automatique de Code Source pour la Sécurité et la Confidentialité de Tierce Applications Mobiles | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Master
|