Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform Page: 12
xi, 149 pages : illustrations (chiefly color)View a full description of this dissertation.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
send random messages to millions of people everyday with the intention of selling his products
or spreading illegal information, the behavior of the app becomes a spammer. Thus, even with a
benign app, user-intention can change the benign behavior of the app. Further, user-intention also
can reveal the type of the user. User types can be a regular-user, hacker, spammer, novice-user,
expert-user etc. This is very useful in implementing security measures in the app itself to self-resist
any malicious demands from a malicious user. H. Zhang et al. work can be identified as another
example of user-intention is utilized in security domain. In their work, they identified software
flows or malicious code activities in computer a network using the user-intentions [109].
In chapter 7 I discuss about how to determine the user-intention in a social network en-
vironment by using user's app usage pattern (in these examples I used several clues such as the
number of Tweets per day, mean reply delay etc.) and how to identify different roles of these
users. Identifying these user-intention is useful in securing a user based systems.
Chapter 8 is another example of utilizing user-intention in a secure environment. In this
example, the user-intention is used to enhance the performance of a secure system that can be very
useful in resource constrained environment such as mobile devices. This chapter explains about
context-aware encryption based on user-intention such that, encryption can be relaxed or tightened.
Here, the identified user-intention are whether the user intended to communicate sensitive infor-
mation or the non-sensitive information. This work can be remodeled to provide security against
unintentional security vulnerabilities in mobile phone conversations.
2.1.2. Developer-intention
Similar to user-intention, developer-intention can be defined as the intention of the devel-
oper of a software or an app. Software developers develop applications in achieving many different
solutions. For instance, a developer can intend to develop a software to monitor the internet traffic
in a smart phone. Mainly the developed software reflects the developer's intention of the software.
Further, it is hard to determine what the actual intention of the developer is. The only way to de-
termine this would be to analyze the software itself and its documentations. For this reason, in this
dissertation I focus on the app-intentions rather than the direct developer intention. This is because
at the end of the day, the intention of the app is the only important aspect in securing a system12
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Mohamed Issadeen, Mohamed Fazeen. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform, dissertation, December 2014; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc700067/m1/26/: accessed July 18, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .