Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/591
Full metadata record
DC FieldValueLanguage
dc.contributor.authorABDELKADER-KHAROUBI, MOhamed YAssine-
dc.date.accessioned2023-10-22T08:09:32Z-
dc.date.available2023-10-22T08:09:32Z-
dc.date.issued2023-
dc.identifier.urihttps://repository.esi-sba.dz/jspui/handle/123456789/591-
dc.descriptionEncadrant : Pr Amar Djamel BENSABER / Co-Encadrant : Pr Djamel-Abdelhak SERIAIen_US
dc.description.abstractAbstract : Mobile apps are indispensable in our daily routines, serving as portals to information, communication, entertainment, and myriad other services. However, as many of these apps amass a wealth of our sensitive data, encompassing personal, financial, and social media details, they’ve evolved into prime targets for hackers. This surge in cyber threats has escalated mobile vulnerabilities notably. In this study, we delve into the primary security threats pertaining to mobile applications, especially Android apps developed using Flutter. While we explore solutions already provided by the community, we critically analyze their limitations. Furthermore, this work offers a set of remedies for prevalent mobile app vulnerabilities, shedding light on how we’ve enhanced existing solutions.en_US
dc.language.isoenen_US
dc.subjectStatic Analysisen_US
dc.subjectReverse Engineeringen_US
dc.subjectSoftware Securityen_US
dc.subjectMobile Developmenten_US
dc.subjectMobile Vulnerabilitiesen_US
dc.titleRemédiation/Correction Automatique de Code Source pour la Sécurité et la Confidentialité de Tierce Applications Mobilesen_US
dc.typeThesisen_US
Appears in Collections:Ingénieur

Files in This Item:
File Description SizeFormat 
pfe_final-1-1.pdf51,82 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.