Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/20837Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Singh, Amrinder | - |
| dc.date.accessioned | 2026-05-10T09:08:16Z | - |
| dc.date.available | 2026-05-10T09:08:16Z | - |
| dc.date.issued | 2021-06 | - |
| dc.identifier.uri | http://localhost:8081/jspui/handle/123456789/20837 | - |
| dc.guide | Mishra, Manoj | en_US |
| dc.description.abstract | Mobile phones have become ubiquitous in our lives. The number of sensitive and private transactions involving sensitive and intimate data that take place on mobile phones are increasing day by day. Mobile phone market is dominated by Android Mobile OS with 72% market coverage globally. Some of the major challenges faced by Android security experts include hardening of emulated environment to mitigate code obfuscation techniques used by malware authors and handling of rootkits. In this paper, we study various methods of hardening the emulated environment. We will also look at rootkits which are one of the most dangerous Advanced Persistent Threats. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IIT Roorkee | en_US |
| dc.title | Designing an Efficient Method for Detecting Kernel Level Rootkits | en_US |
| dc.type | Dissertations | en_US |
| Appears in Collections: | MASTERS' THESES (CSE) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 19535005_Amrinder Singh.pdf | 3.6 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
