Analysis and Classification of Android Malware

Total Page:16

File Type:pdf, Size:1020Kb

Analysis and Classification of Android Malware Analysis and Classification of Android Malware Kimberly Kim-Chi Tam Information Security Department Royal Holloway, University of London A thesis submitted for the degree of Doctor of Philosophy 2016 Acknowledgements First I would like to acknowledge my supervisor and advisor, Dr. Lorenzo Cavallaro and Professor Cid Carlos, for the amazing opportunity to do my PhD at Royal Holloway University of London. It would not have been possible without you two. I would also like to acknowledge my fellow Royal Holloway University of London lab members and external collaborators for their partnership in collaborative work. In particular I would like to thank Salahuddin Khan for his technical expertise, his professionalism, and his friendship. Similarly, I feel much gratitude towards Professor Kevin Jones and Dr. War- rick Cooke for their extensive advice for both fine-tuning this thesis in detail and the overall story and flow. Parts of this research was funded by UK EPSRC grant EP/L022710/1. I would also like to thank Hewlett-Packard in Bristol for the internship op- portunity during my PhD as well as all of their support since then. Finally, I want to acknowledge my family and friends scattered across the globe. Organizing opportunities to connect has been a real challenge over the last few years, but we always managed it. So thank you all for the fun and help throughout the good times and bad. I could not have gotten this far without your awesomeness. “One does not discover new lands without consenting to lose sight of the shore for a very long time.” Andre Gide 2 Abstract With the integration of mobile devices into our daily lives, smartphones are privy to increasing amounts of sensitive information. As of 2016, Android is the leading smartphone in popularity with sophisticated mobile malware targeting its data and services. Thus this thesis attempts to determine how accurate and scalable Android malware analysis and classification methods can be developed to robustly withstand frequent, and substantial, changes within the Android device and in the Android malware ecosystem. First, the author presents a comprehensive survey on leading Android mal- ware analysis and detection techniques, and their effectiveness against evolv- ing malware. Through the systematized survey, the author identifies under- developed areas of research which lead to the development of the novel Android malware analysis and classification solutions within in this thesis. This thesis considers the usefulness and feasibility of reconstructing high- level behaviours via system calls intercepted while running Android apps. Previously, this method had only been rudimentarily implemented. How- ever, the author was able to remedy this and developed a robust, novel, framework, to automatically and completely reconstructs all Android mal- ware behaviours by thoroughly analysing dynamically captured system calls. Next, the author investigates the efficacy of using our reconstructed be- havioural profiles, at different levels of abstractions, to classify Android malware into families. Experiments in this thesis show our reconstructed behaviours to be more effective, and efficient, than raw system call traces. To classify malware, we utilized support vector machines to achieve high accuracy, precision and recall. Deviating from previous methods, we fur- ther apply statistical classification to achieve near-perfect accuracies. Finally, the author explores an alternative Android malware analysis method using memory forensics. By extrapolating from these experiments, the au- thor theorizes how to use this method to assist in capturing behaviours our previous methods could not, and how they could assist classification. 3 Contents 1 Introduction 12 1.1 Android Malware Threat . 12 1.2 Desirable Solution Traits . 13 1.3 Organization of the Thesis . 14 1.4 Declaration of Authorship for Co-Authored Work . 15 2 Background 17 2.1 Introduction . 18 2.1.1 Evolution of Malware . 19 2.1.2 Android Architecture . 22 2.1.3 Notable Android Malware . 23 2.1.4 Statistics for Android Malware Evolution . 24 2.2 Taxonomy of Mobile Malware Analysis Approaches . 27 2.2.1 Static Analysis . 28 2.2.2 Dynamic Analysis . 32 2.2.3 Hybrid Analysis . 36 2.2.4 Analysis Techniques . 36 2.2.5 Feature Selection . 42 2.2.6 Building on Analysis . 43 2.3 Malware Evolution to Counter Analysis . 44 2.3.1 Trivial Layout Transformations . 44 2.3.2 Transformations that Complicate Static Analysis . 44 2.3.3 Transformations that Prevent Static Analysis . 46 2.3.4 Anti-Analysis and VM-Aware . 46 2.4 Discussion . 47 2.4.1 Impact and Motivation . 47 2.4.2 Mobile Security Effectiveness . 51 2.5 General Areas for Future Research . 53 4 Analysis and Classification of Android Malware 2.5.1 Hybrid Analysis and Multi-Levelled Analysis . 53 2.5.2 Code Coverage . 53 2.5.3 Hybrid Devices and Virtualization . 54 2.5.4 Datasets . 55 2.6 Thesis Goals and Contributions . 56 3 Automatic Reconstruction of Android Behaviours 57 3.1 Introduction . 58 3.2 Relevant Background Information . 60 3.2.1 Android Applications . 60 3.2.2 Inter-Process Communications and Remote Procedure Calls . 61 3.2.3 Android Interface Definition Language . 63 3.2.4 Native Interface . 63 3.3 Overview of CopperDroid . 64 3.3.1 Independent of Runtime Changes . 64 3.3.2 Tracking System Call Invocations . 65 3.4 Automatic IPC Unmarshalling . 66 3.4.1 AIDL Parser . 66 3.4.2 Concept for Reconstructing IPC Behaviours . 67 3.4.3 Unmarshalling Oracle . 68 3.4.4 Recursive Object Exploration . 73 3.4.5 An Example of Reconstructing IPC SMS . 74 3.5 Observed Behaviours . 76 3.5.1 Value-Based Data Flow Analysis . 78 3.5.2 App Stimulation . 79 3.6 Evaluation . 81 3.6.1 Effectiveness . 81 3.6.2 Performance . 84 3.7 Limitations and Threat to Validity . 86 3.8 Related Work . 87 3.9 Summary . 90 4 Classifying Android Malware 91 4.1 Introduction . 92 4.2 Relevant Machine Learning Background . 94 4.2.1 Support Vector Machines (SVM) . 94 4.2.2 Conformal Prediction (CP) . 96 5 Analysis and Classification of Android Malware 4.3 Novel Hybrid Prediction: SVM with CP . 97 4.4 Obtaining CopperDroid Behaviours . 98 4.4.1 System Architecture . 98 4.4.2 Modes and Thresholds . 99 4.4.3 Parsing CopperDroid JSONs and Meta data . 100 4.4.4 Behaviour Extraction . 100 4.5 Multi-Class Classification . 102 4.5.1 Behaviour Feature Vectors for SVM . 103 4.5.2 Accuracy and Limitations of Our Traditional SVM . 105 4.5.3 Enhancing SVM with Conformal Predictions . 105 4.6 Statistics and Results . 106 4.6.1 Dataset, Precision, and Recall . 107 4.6.2 Classification Using SVM . 108 4.6.3 Coping with Sparse Behavioural Profiles . 113 4.6.4 Hybrid Prediction: SVM with Selective CP . 115 4.7 Limitations and Threat to Validity . 118 4.8 Related Works . 119 4.9 Summary . 122 5 Supplemental Analysis Approach 123 5.1 Android Memory Image Forensics . 124 5.2 Relevant Background . 125 5.2.1 Memory Forensics . 126 5.2.2 The Android System Recap . 126 5.3 Specific Examples of Malware Behaviours . 128 5.3.1 Root Exploits . 129 5.3.2 Stealing User and Device Data . 132 5.4 Design and Implementation . 133 5.4.1 Android SDK and Kernel . 133 5.4.2 LiME . 134 5.4.3 Volatility . 135 5.4.4 Stimuli and Modifications . 136 5.5 Memory Analysis . 136 5.5.1 Libraries Artefacts . 137 5.5.2 Linux Filesystem Artefacts . 138 5.5.3 Process Tree and ID Artefacts . 140 6 Analysis and Classification of Android Malware 5.5.4 Extras: Miscellaneous String . 142 5.5.5 Theory: Memory Fingerprints . 143 5.6 Case Studies . 144 5.6.1 BaseBridge A . 144 5.6.2 DroidKungFu A . 151 5.7 Limitations and Threat to Validity . 158 5.8 Related Works . 159 5.9 Summary . 161 6 Conclusions and Future Work 163 6.1 Restating Research Problems and Research Goals . 164 6.2 Research Contributions and Distribution of Work . 164 6.2.1 CopperDroid . 165 6.2.2 Android Malware Classification . 165 6.2.3 Memory Forensics . 166 6.2.4 Goals Met . 167 6.3 Future Directions . 167 6.4 Concluding Remarks . 170 A Comparison of Related Works 171 B Overall Results on McAfee dataset 174 C Classification Feature Statistics 176 D Malware Manifests 178 Bibliography 184 7 List of Figures 2.1 Worldwide Smartphone Sales by Operating System (OS) from 2006 to end of 2014. 21 2.2 Overview of the Android Operating System (OS) Architecture. 23 2.3 Evolution of Android malware using obfuscating techniques (e.g., cryp- tography APIs). ..
Recommended publications
  • A Study of Android Application Security
    A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks.
    [Show full text]
  • Éric FREYSSINET Lutte Contre Les Botnets
    THÈSE DE DOCTORAT DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité Informatique École doctorale Informatique, Télécommunications et Électronique (Paris) Présentée par Éric FREYSSINET Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : Lutte contre les botnets : analyse et stratégie Présentée et soutenue publiquement le 12 novembre 2015 devant le jury composé de : Rapporteurs : M. Jean-Yves Marion Professeur, Université de Lorraine M. Ludovic Mé Enseignant-chercheur, CentraleSupélec Directeurs : M. David Naccache Professeur, École normale supérieure de thèse M. Matthieu Latapy Directeur de recherche, UPMC, LIP6 Examinateurs : Mme Clémence Magnien Directrice de recherche, UPMC, LIP6 Mme Solange Ghernaouti-Hélie Professeure, Université de Lausanne M. Vincent Nicomette Professeur, INSA Toulouse Cette thèse est dédiée à M. Celui qui n’empêche pas un crime alors qu’il le pourrait s’en rend complice. — Sénèque Remerciements Je tiens à remercier mes deux directeurs de thèse. David Naccache, officier de réserve de la gendarmerie, contribue au développement de la recherche au sein de notre institution en poussant des personnels jeunes et un peu moins jeunes à poursuivre leur passion dans le cadre académique qui s’impose. Matthieu Latapy, du LIP6, avec qui nous avions pu échanger autour d’une thèse qu’il encadrait dans le domaine difficile des atteintes aux mineurs sur Internet et qui a accepté de m’accueillir dans son équipe. Je voudrais remercier aussi, l’ensemble de l’équipe Réseaux Complexes du LIP6 et sa responsable d’équipe actuelle, Clémence Magnien, qui m’ont accueilli à bras ouverts, accom- pagné à chaque étape et dont j’ai pu découvrir les thématiques et les méthodes de travail au fil des rencontres et des discussions.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A
    WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A dissertation submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy with a Major in Criminal Justice August 2014 Committee Members: Brian L. Withrow, Chair Bob Edward Vásquez Jay D. Jamieson Matthew Draper Jose R. Agustina COPYRIGHT by Kevin W. Jennings 2014 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Kevin Jennings, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. DEDICATION To Hal Jennings, Judy Jennings, and Matthew Draper, for showing me the path. To Sara Jennings, for joining me on the journey. ACKNOWLEDGEMENTS This dissertation never would have been possible without the support of many people who have guided me and cheered me on throughout this process. Dr. Brian Withrow was an excellent chair, and Doctors Vasquez, Jamieson, Draper, and Agustina all did their part in making this paper possible. Thank you for helping me, but even more important, thank you for putting up with me. I also need to give a big thank you to my mentor Dr. Tomas Mijares, who could not be on my committee but helped and guided me throughout the process of learning, teaching, and growing at Texas State University.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Universidad Carlos Iii De Madrid Signal Processing
    UNIVERSIDAD CARLOS III DE MADRID ESCUELA POLITÉCNICA SUPERIOR BACHELOR THESIS SIGNAL PROCESSING FOR MALWARE ANALYSIS Computer Engineering Department AUTHOR: Raquel Tabuyo Benito TUTOR: Pedro Peris Lopez June, 2016 Bachelor Thesis. Signal Processing for Malware Analysis “Perseverance is not a long race. It is many short races one aftr te oter” -Walter Elliot - Page .2 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Acknowledgements To my whole family, specially my sister, for whom I have an unconditionally love. I am really grateful for their dedication, patience, support and encouragement to follow my dreams. To Pedro, my Bachelor Thesis tutor, whose kindness and guidance have helped me during this wonderful trip. To my friends, thank you very much for showing me the meaning of true friendship. Without all of you, this would have never been possible. - Page .3 of 134. - Bachelor Thesis. Signal Processing for Malware Analysis Abstract This Project is an experimental analysis of Android malware through images. The analysis is based on classifying the malware into families or differentiating between goodware and malware. This analysis has been done considering two approaches. These two approaches have a common starting point, which is the transformation of Android applications into PNG images. After this conversion, the first approach was subtracting each image from the testing set with the images of the training set, in order to establish which unknown malware belongs to a specific family or to distinguish between goodware and malware. Although the accuracy was higher than the one defined in the requirements, this approach was a time consuming task, so we consider another approach to reduce the time and get the same or better accuracy.
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • Cybercrime Hits the Unexpected
    TrendLabsSM 1Q 2014 Security Roundup Cybercrime Hits the Unexpected Bitcoin- and PoS-System-Related Attacks Trouble Users Distributed by: TREND MICRO | TrendLabs 1Q 2014 Security Roundup TREND MICRO | TrendLabs 1Q 2014 Security Roundup Contents It gives me immense pleasure to share this report, developed by Trend Micro and distributed by ITU based on our fruitful partnership. This report is part of ITU’s overall support to its 193 Member States within the framework of the Global Cybersecurity Agenda. This is clear result of our partnership with Private Sector in our effort to tackle this growing Global phenomenon. 1 | Cybercrime and the Cybercriminal Underground These efforts are aimed at equipping Member States with information on the latest cybersecurity threats and corresponding counter-measures, and eventually contribute to the creation of a safe and secure cyberspace for consumers, businesses and youth everywhere. This Trend Micro quarterly report underlines the existing and emerging malicious cyber activities observed during the first quarter of 2014. Some highlights of this 10 | Mobile Threat Landscape report: • Cybercriminals are continuing to innovate and create new ways to commit digital crimes. Crypto-currency exchanges and wallets are being compromised for the purpose of theft. In addition, online banking malware are being enhanced with new technologies to exact the maximum damage. 15 | Targeted Attack Campaigns • With the exponential growth in the mobile industry, cyber-criminals are and Cyber Attacks increasingly targeting mobile devices. There is a proliferation of maliciously tampered and re-packaged apps that circumvent the security firewalls in mobile devices. • We are also witnessing cases of attacks directly aimed at organizations that rely on specific Point of Sales (Pos) systems features.
    [Show full text]
  • The Malware Book 2016
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................
    [Show full text]
  • Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla
    Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla To cite this version: Paul Irolla. Formalization of Neural Network Applications to Secure 3D Mobile Applications. Quanti- tative Methods [q-bio.QM]. Université Paris Saclay (COmUE), 2018. English. NNT : 2018SACLS585. tel-02047792 HAL Id: tel-02047792 https://tel.archives-ouvertes.fr/tel-02047792 Submitted on 25 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formalization of neural 2018SACLS585 network to secure 3D NNT: mobile applications Thèse de doctorat de l’Université Paris-Saclay préparée à l’Université Paris-Sud École doctorale n± 568 Biosigne Spécialité de doctorat: innovation technologique Thèse présentée et soutenue a l’ESIEA Laval, le 19 décembre 2018, par Paul Irolla Composition du jury: Éric Filiol Directeur de recherche — Laboratoire CNS Directeur de thèse Jean-Philippe Deslys Directeur de recherche — Laboratoire CEA/DRF/iMETI/SEPIA Co-directeur de thèse Ludovic Apvrille Professeur — Laboratoire LabSoC (Telecom ParisTech) Rapporteur Antonella Santone Professeur — Università degli Studi del Molise Rapporteur Maroun Chamoun Professeur — Université Saint-Joseph (Beyrouth) Président Akka Zemmari Maître de conférences — Laboratoire LaBRI (CNRS) Examinateur Thèse de doctorat Thèse Titre: Formalisation et applications des réseaux de neurones à la sécurisation d’applications mobiles 3D.
    [Show full text]
  • How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards
    HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables ....................................................................................................................
    [Show full text]
  • Tilburg University Breaking and Remaking Law and Technology Dizon
    Tilburg University Breaking and remaking law and technology Dizon, Michael Publication date: 2016 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Dizon, M. (2016). Breaking and remaking law and technology: A socio-techno-legal study of hacking. [s.n.]. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. sep. 2021 B REAKING AND R EMAKING L AW AND TECHNOL OGY A Socio-Techno-Legal Study of Hacking MICHAEL ANTHONY C. DIZON B REAKING AND R EMAKING L AW AND TECHNOL OGY A Socio-Techno-Legal Study of Hacking Proefschrift ter verkrijging van de graad van doctor aan Tilburg University op gezag van de rec- tor magnificus, prof.dr. E.H.L. Aarts, in het openbaar te verdedigen ten overstaan van een door het college voor promoties aangewezen commissie in de aula van de Universiteit op dinsdag 28 juni 2016 om 16.15 uur door MICHAEL ANTHONY CO DIZON geboren op 13 juni 1975 te Quezon City, Filipijnen Promotores: prof.dr.
    [Show full text]