Now showing items 1-4 of 4
Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection
(Virginia Tech, 2014-01-31)
The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation and runtime using ...
Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments
(Virginia Tech, 2014-03-07)
As wireless communication mediums develop and Dynamic Spectrum Access (DSA) is implemented as a means to increase capacity on a limited spectrum, the threat of reactive interference becomes real. The motivation for this ...
Architecture for Issuing DoD Mobile Derived Credentials
(Virginia Tech, 2014-07-01)
With an increase in performance, dependency and ubiquitousness, the necessity for secure mobile device functionality is rapidly increasing. Authentication of an individual's identity is the fundamental component of physical ...
An Implementation of Utility-Based Traffic Shaping on Android Devices
(Virginia Tech, 2014-07-23)
Long Term Evolution (LTE) was designed to provide fast data rates to replace 3G service for mobile devices. As LTE networks and the user base for those networks grow, it becomes necessary for the resources used for those ...