Hi guys.
Currently I am writing my Masters thesis for a Computer Science Security master in the Netherlands. The goal of my research is to circumvent the controls implemented by a mobile device management system (any) on Android. My current idea is to do this with malware. My question to you is: is it feasable that I can circumvent the controls? And: what kind of approach can I look in to when writing malware (i.e. intent forging, setting altering etc)
Any scientific sources you may have are welcome as wel!
In this topic I will keep you guys posted on my progress!
Kind regards.
Currently I am writing my Masters thesis for a Computer Science Security master in the Netherlands. The goal of my research is to circumvent the controls implemented by a mobile device management system (any) on Android. My current idea is to do this with malware. My question to you is: is it feasable that I can circumvent the controls? And: what kind of approach can I look in to when writing malware (i.e. intent forging, setting altering etc)
Any scientific sources you may have are welcome as wel!
In this topic I will keep you guys posted on my progress!
Kind regards.
Aucun commentaire:
Enregistrer un commentaire