[MDM] Malware approach - Security Discussion

Hi guys.
Currently I am writing my Masters thesis for a Computer Science Security master in the Netherlands. The goal of my research is to circumvent the controls implemented by a mobile device management system (any) on Android. My current idea is to do this with malware. My question to you is: is it feasable that I can circumvent the controls? And: what kind of approach can I look in to when writing malware (i.e. intent forging, setting altering etc)
Any scientific sources you may have are welcome as wel!
In this topic I will keep you guys posted on my progress!
Kind regards.

Related

[Q] Technical details for online mobile app stores

Hello everyone ,
First off, I apologize if this is the wrong type of question, but you are the only community I know that has the knowledge of the technical details am I looking for. I have asked this in several communities but failed to deliver a proper question and get a proper response.
Here is my train of thought, I hope you can follow:
So I have the presentation about mechanisms of online mobile app stores. I have to describe security and financial mechanisms (background asspects), protocols that are used when app is downloading from market. Also, I have to describe the architecture of that stores, although they don't have some unique architecture, but it describes their work as the principle. So, the main purpose of this presentation is to see how to implement online mobile app store and which technologies and protocols to use.
Thanks in advance

[Q] Writing my dissertation, need help with the data collection and organization.

Hi to everyone. I'm new to this forum. I'm currently due to finish my dissertation, however I'm only on the half way where I supposed to submit it in one week. The problem I have is the secondary data collection and its organisation for literature review chapter. The topic is about the applications that have malicious code on Android mobile platform and key threats to the data in this mobile platform from malware authors. I have already written about the android in general, its architecture, security measures and some of the threats that are in place. But the problem is that there is a lot of data out there and I don't know how to link them, organize them, what exactly more important than another. If anyone can help me with some tips on topics here and how to better outline (for example. Background, Architecture, security measures, and what is afterwards?). Any advice is appreciated, please post on here whatever information could be useful, even if I have already covered, such as background about android and its architecture with security measures. Thanks

[MDM] Research

Hello everyone,
currently I am finishing up my Computer Science Security masters. I am writing my thesis on Mobile Device Management solutions on Android and I can use your help! My idea was to create a framework to structurally test the quality of the controls, but there has been some research on this subject (Rhee - A study on the security evaluation of a MDM system). My current idea is to create malware that destroys one (or more) control, implied by the MDM solution. What is your view on this subject and is anyone deep into MDMs?
Kind regards!

Android Security

Welcome everyone,
I am making a presentation about android security as a whole system and I'd like to ask you for little help.
As far as theory goes it seems there is enough clear information to find but to finish my project I need to show practical vulnerabilities of the system like an exploit ( I was thinking about showing a process of rooting ) or some kind of virus. Could you guys recommend to me something in this taste? 'Safe' malicious app and a way to monitor it.
Another idea of mine is to get control of android using pc but all I could think of was get 'the user' install an app which would get additional privilege to let control the system.
I was thinking of using android system on virtual machine - like this one: osboxes.org/android-x86
If you guys know some app which would let me monitor every movement in the system like even facebook app to show how many connections it does it would help me greatly.
Sorry if my English is not the best it is not my first language.
Thanks in advance Keve LiSipi
You could discuss the Anserverbot Trojan, which is used to infect non-virus applications and fetches the malicious payload. There exists a whole paper on the analysis.
To take control, you could look at the Stagefright vulnerability, you could use an exploit to get root shell on a device.
And also you can show the exynos abuse xploit

Idea contest for the future development of open source software and operating systems

Dear users of xda developers
Within the context of a research project by the Institute of Technology and Innovation Management at the Helmut-Schmidt-University Hamburg, we are investigating the potential of online communities as an instrument for the prediction of future developments and trends. We are planning to execute an “idea contest” which separates in four phases. We have no financial interests in the ideas. We are only interested how online communities discuss about the future.
THE PROCEDURE
First phase
How will open source software and operating systems look like in the year 2030?
This phase is a brainstorming of the future development open source software and operating systems.
The ideas and concepts should be posted within this thread and be discussed with other users. It doesn’t matter how detailed the concepts or ideas are. There is no right or wrong. Every idea and concept, regardless how farfetched or ‘exaggerated’ will be considered.
Time period for this round: 14 days.
We are looking forward to your discussions!
If you have any questions, just write here in the thread or contact us. We will guide you through the contest!
And now let’s start with phase 1!
@Zeng1987 & @Gideon92
___
@svetius approved
Hey folks, we,
@Zeng1987 and myself, are very eager to hear your ideas and concepts how open soruce software and operating systems look like in 2030!
Best regards,
@Gideon92
Cloud Computing
Hey Guys,
This sounds quite interesting.
I think cloud computing will play an important role for the future and will replace external storages.
In my company everthing is saved and stored in a cloud.
What do you guys think?
---
Qwertz92

Categories

Resources