Viber Communication Security - Bad Request
Viber Communication Security - Bad Request
Viber Communication Security - Bad Request
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Log Appendix C<br />
[31] Google, “What is the ndk?,” 2011. http://developer.android.com/sdk/ndk/overview.html.<br />
[32] D. Octeau, W. Enck, and P. McDaniel, “The ded decompiler,” tech. rep., Network and <strong>Security</strong><br />
Research Center, Department of Computer Science and Engineering, Pennsylvania<br />
State University, University Park, PA, USA, 2010. http://siis.cse.psu.edu/ded/papers/<br />
NAS-TR-0140-2010.pdf.<br />
[33] N. A. Naeem, “Programmer-friendly decompiled java,” Master’s thesis, McGill University,<br />
2006. http://www.sable.mcgill.ca/publications/thesis/masters-nnaeem/<br />
sable-thesis-2006-masters-nnaeem.pdf.<br />
[34] pxb1988@gmail.com, “dex2jar wiki entry éxample ´ ,” 2011. http://code.google.com/p/<br />
dex2jar/wiki/Example.<br />
[35] Google, “Proguard,” 2011. http://developer.android.com/guide/developing/tools/<br />
proguard.html.<br />
[36] Google, “Telephonymanager,” 2011. http://developer.android.com/reference/android/<br />
telephony/TelephonyManager.html.<br />
[37] Google, “Securerandom,” 2011. http://developer.android.com/reference/java/security/<br />
SecureRandom.html.<br />
[38] I. <strong>Viber</strong> Media, “<strong>Viber</strong> privacy policy,” 2011. http://viber.com/privacypolicy.html.<br />
[39] Wikipedia, “Kerckhoffs principle,” 19th century. http://en.wikipedia.org/wiki/<br />
Kerckhoffs%27s_principle.<br />
C Log<br />
We haven’t really kept any dates but we all worked on individual parts and collaborated during class.<br />
This accounted for at least 15-20 hours every week.<br />
Michiel Lab set-up, Protocol Reverse Engineering, Packet capturing and analysis.<br />
Jeffrey Lab set-up, Program Code Analysis, Other Weaknesses, Packet capturing.<br />
Gerrie Other Services, Local Storage (DB & configuration) Analysis.<br />
40