DC Field | Value | Language |
dc.contributor.author | ABDELKADER-KHAROUBI, MOhamed YAssine | - |
dc.date.accessioned | 2023-10-22T08:09:32Z | - |
dc.date.available | 2023-10-22T08:09:32Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/591 | - |
dc.description | Encadrant : Pr Amar Djamel BENSABER / Co-Encadrant : Pr Djamel-Abdelhak SERIAI | en_US |
dc.description.abstract | Abstract :
Mobile apps are indispensable in our daily routines, serving as portals to information, communication,
entertainment, and myriad other services. However, as many of these apps amass a wealth of
our sensitive data, encompassing personal, financial, and social media details, they’ve evolved into
prime targets for hackers. This surge in cyber threats has escalated mobile vulnerabilities notably.
In this study, we delve into the primary security threats pertaining to mobile applications, especially
Android apps developed using Flutter. While we explore solutions already provided by the
community, we critically analyze their limitations. Furthermore, this work offers a set of remedies
for prevalent mobile app vulnerabilities, shedding light on how we’ve enhanced existing solutions. | en_US |
dc.language.iso | en | en_US |
dc.subject | Static Analysis | en_US |
dc.subject | Reverse Engineering | en_US |
dc.subject | Software Security | en_US |
dc.subject | Mobile Development | en_US |
dc.subject | Mobile Vulnerabilities | en_US |
dc.title | Remédiation/Correction Automatique de Code Source pour la Sécurité et la Confidentialité de Tierce Applications Mobiles | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Ingénieur
|