17.12.2012 Views

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Log Appendix C<br />

[31] Google, “What is the ndk?,” 2011. http://developer.android.com/sdk/ndk/overview.html.<br />

[32] D. Octeau, W. Enck, and P. McDaniel, “The ded decompiler,” tech. rep., Network and <strong>Security</strong><br />

Research Center, Department of Computer Science and Engineering, Pennsylvania<br />

State University, University Park, PA, USA, 2010. http://siis.cse.psu.edu/ded/papers/<br />

NAS-TR-0140-2010.pdf.<br />

[33] N. A. Naeem, “Programmer-friendly decompiled java,” Master’s thesis, McGill University,<br />

2006. http://www.sable.mcgill.ca/publications/thesis/masters-nnaeem/<br />

sable-thesis-2006-masters-nnaeem.pdf.<br />

[34] pxb1988@gmail.com, “dex2jar wiki entry éxample ´ ,” 2011. http://code.google.com/p/<br />

dex2jar/wiki/Example.<br />

[35] Google, “Proguard,” 2011. http://developer.android.com/guide/developing/tools/<br />

proguard.html.<br />

[36] Google, “Telephonymanager,” 2011. http://developer.android.com/reference/android/<br />

telephony/TelephonyManager.html.<br />

[37] Google, “Securerandom,” 2011. http://developer.android.com/reference/java/security/<br />

SecureRandom.html.<br />

[38] I. <strong>Viber</strong> Media, “<strong>Viber</strong> privacy policy,” 2011. http://viber.com/privacypolicy.html.<br />

[39] Wikipedia, “Kerckhoffs principle,” 19th century. http://en.wikipedia.org/wiki/<br />

Kerckhoffs%27s_principle.<br />

C Log<br />

We haven’t really kept any dates but we all worked on individual parts and collaborated during class.<br />

This accounted for at least 15-20 hours every week.<br />

Michiel Lab set-up, Protocol Reverse Engineering, Packet capturing and analysis.<br />

Jeffrey Lab set-up, Program Code Analysis, Other Weaknesses, Packet capturing.<br />

Gerrie Other Services, Local Storage (DB & configuration) Analysis.<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!