The spread of mobile devices that are increasingly connected to the net has lead to a rise of the importance of security in mobile systems. This study can be included in the area of analysis and verification of software involved in the data confidentiality, more specifically in the information flow analysis techniques capable of detecting data leakage in mobile applications. Current research can be divided into two different approaches, quantitative and qualitative. The primary aim of this work consists in combining the two approaches, in such a way to exploits the strengths of both. The study starts with an analysis of the current literature in this field, in order to obtain a complete overview also on related themes. The middle phase of the work is focused on finding a composition of the two approaches, starting from concatenating the single features of the two, like the ability to evaluate implicit flows, up to arrive at a unique synthesis. Finally the new method will be used to try to examine leakage of data created by the set of all the applications installed in the system.

A Quantitative Datacentric Approach to Differential Confidentiality Analysis

Barbon, Gianluca
2015/2016

Abstract

The spread of mobile devices that are increasingly connected to the net has lead to a rise of the importance of security in mobile systems. This study can be included in the area of analysis and verification of software involved in the data confidentiality, more specifically in the information flow analysis techniques capable of detecting data leakage in mobile applications. Current research can be divided into two different approaches, quantitative and qualitative. The primary aim of this work consists in combining the two approaches, in such a way to exploits the strengths of both. The study starts with an analysis of the current literature in this field, in order to obtain a complete overview also on related themes. The middle phase of the work is focused on finding a composition of the two approaches, starting from concatenating the single features of the two, like the ability to evaluate implicit flows, up to arrive at a unique synthesis. Finally the new method will be used to try to examine leakage of data created by the set of all the applications installed in the system.
2015-03-12
File in questo prodotto:
File Dimensione Formato  
818453-1174489.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 371.95 kB
Formato Adobe PDF
371.95 kB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14247/22293