Selected Areas in Security & Privacy: Building Secure Mobile Applica:ons (SMA)
|
|
- Sherman Norton
- 8 years ago
- Views:
Transcription
1 Selected Areas in Security & Privacy: Building Secure Mobile Applica:ons (SMA) Prof. Dr. rer. nat. Dogan Kesdogan Dipl.- Inform. Mohamed Bourimi University of Siegen, Chair for IT Security, Germany
2 Overview ios PlaGorm Security Development Best Prac:ces Summary
3 Where we are now? Cross-cutting concerns such as Usability/User experience, Performance, Integration, Inter-operability, Group Awareness, etc. Application Layer Design of Privacy App Architecture Emulation Rendering Virtual Machines Android ios OS Layer Compiler & language capabilities Network Access File System Access HW
4 The iphone Mobile Pla3orm (Dwivedi et al. 2010) Perhaps the most influencal mobile device to enter the market in recent years is Apple s iphone. Because of its use of ObjecCve- C, development on the iphone carries the risk of security flaws tradiconally associated with C sooware (classic C vulnerabilices).
5 The iphone Mobile Pla3orm (Dwivedi et al. 2010) However, some of these are masked by the high- level Cocoa Touch APIs, and therefore require special ajen:on (Apple has rela:vely lijle documenta:on available on security best prac:ces in comparaison to HCI guidelines)!
6 The iphone Mobile Pla3orm (Dwivedi et al. 2010) Both the iphone and Mac OS X share the usage of ObjecCve- C and a large part of the Cocoa API. However, a number of components worth nocng are missing or have been changed on the iphone s Cocoa implementacon (Cocoa Touch). Although complete support of Core Data API and Garbage Collec:on are scll absent in the mobile ios (Security!) Some C vulnerabilices: Buffer Overflows and Integer Overflows Format String AYacks
7 C vulnerabilices: Buffer Overflows The buffer overflow is one of the oldest and most well- known exploitable bugs in C. At their most basic level, buffer overflows occur when data is wriyen into a fixed- size memory space, overflowing into the memory around the descnacon buffer (gives an ayacker control over the contents of process memory, potencally allowing for the insercon of hoscle code).
8 C vulnerabilices: Buffer Overflows Although the iphone has some built- in preventacve measures to prevent buffer overflow exploitacon (avoid manual memory management en:rely, and use Cocoa objects such as NSString for string manipula:on), exploits resulcng in code execucon are scll possible (see hyp:// europe- 09/Miller_Iozzo/ BlackHat- Europe Miller- Iozzo- OSX- IPhone- Payloads- whitepaper.pdf).
9 C vulnerabilices: Integer Overflows An integer overflow occurs when a computed value is larger than the storage space it s assigned to. This ooen happens in expressions used to compute the allocacon size for an array of objects because the expression is of the form object_size x object_count. If n is larger than 1 billion (when sizeof(int) is 4), the computed value of sizeof (*x) * n will be larger than 4 billion and will result in a smaller value than intended. This means the allocacon size will be unexpectedly small. When the buffer is later accessed, some reads and writes will be performed past the end of the allocated length, even though they are within the expected limits of the array.
10 C vulnerabilices: Format String AYacks and Double Frees Format string vulnerabilices are caused when the programmer fails to specify how user- supplied input should be formayed, thus allowing an ayacker to specify their own format string. Apple s NSString class does not have support for the %n format string, which allows for wricng to the stack of the running program. C and C++ applicacons can suffer from double- free bugs, where a segment of memory is already freed from use and an ayempt is made to deallocate it again. Typically, this occurs by an extra use of the free() funccon, aoer a previously freed memory segment has been overwriyen with ayacker- supplied data. This results in ayacker control of process execucon. In its most benign form, this can simply result in a crash.
11 Review: iphone Devlopment Develop Test Distribute
12 ios Development VulnerabiliCes Development for the iphone/ios is performed with Xcode and the ios SDK. Code can be run either within the emulator or on a development device (restriccon!). Developing encrypcon funcconality or such funcconality using so- called Keychains or cercficates needs a real device for debugging! ObjecCve- C applicacons decompile fairly cleanly, if you have the right tools (Many Apple developers may be familiar with otool (also proted to ARM), which comes with the OS X developer tools).
13 Further ios Development VulnerabiliCes Example: For versions of the iphone OS 3.x/4.x), you can use the class- dump or class- dump- x tools ( hyp://iphone.freecoder.org/classdump_en.html; also available in Cydia and in MacPorts for OS X) to get very readable informacon on class declaracons and structs from ObjecCve- C object code. For most cases, you ll want to use a jailbroken phone and then ssh into the device to use the iphone version of class- dump- x and/or otool. Another tool that expands on the output of class- dump by resolving addiconal symbols is otx (hyp://otx.osxninja.com).
14 Further ios Development VulnerabiliCes How to prevent reverse engineering of ios Apps? The answer is quite simply: You can t do much. L If someone is mocvated to crack or reverse- engineer your applicacon, they can use far more powerful commercial tools than these to make doing so even easier. But you could make it harder J 1. The development effort required to prevent reverse- engineering costs money, especially if you have to revise your proteccon or obfusca:on mechanisms. 2. Try to hide from some of the aforemenconed mechanisms such as class- dump by pulng your logic into plain C or C++ and ensuring that you strip your binaries.
15 Further ios Security VulnerabiliCes IMEI forwarding can not be easy disabled in ios! Many arccles affirm that ios Apps send IMEI and other sensicve data to CuperCno L (Apple, however, restricted the access to the IMEI in recent ios versions). Apple s Privacy Policy has to be accepted (periodically updated) and Credit Card data have to be communicated to Apple in order to be able to use the App Store (SoluCon for Germany by using third- party payment provider now possible)! Apple has implemented nocficacon services for third- party apps as well as opened up formerly proprietary funcconality (such as the ipod library access) to third- party developers.
16 Summary More generally, it has been speculated that the iphone OS and Mac OS X will gradually merge in the future, as mobile hardware becomes more capable. Under pressure from new contenders such as Android, Apple s Development Agreements will become flexible (and perhaps the followed restriccve philosophy) Many vulnerabilices of the ios mobile pla3orm are due to the underlying C language. Some issues can be solved some not! However, there are many best praccces ;- )
eggon SDK for ios 7 Integration Instructions
eggon SDK for ios 7 Integration Instructions The eggon SDK requires a few simple steps in order to be used within your ios 7 application. Environment This guide assumes that a standard ios Development
More informationABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
More informationLearn the fundamentals of Software Development and Hacking of the iphone Operating System.
Course: Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: Learn the fundamentals of Software Development and Hacking of the iphone Operating System. provides an Instructor-led
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationChapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.
Chapter 1 Introduction to ios Development Objectives: Touch on the history of ios and the devices that support this operating system. Understand the different types of Apple Developer accounts. Introduce
More informationPentesting iphone Applications. Satishb3 http://www.securitylearn.net
Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who
More informationEvaluation of Xamarin Forms for MultiPlatform Mobile Application Development
Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2016 Evaluation of Xamarin Forms for MultiPlatform Mobile Application Development Amer A. Radi
More informationPentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
More informationAdvanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
More informationDeveloping Applications for ios
Developing Applications for ios Lecture 1: Mobile Applications Development Radu Ionescu raducu.ionescu@gmail.com Faculty of Mathematics and Computer Science University of Bucharest Content Key concepts
More informationios Application Development &
Introduction of ios Application Development & Swift Programming Language Presented by Chii Chang chang@ut.ee Outlines Basic understanding about ios App Development Development environment: Xcode IDE Foundations
More informationPenetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
More informationSYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
More informationMA-WA1920: Enterprise iphone and ipad Programming
MA-WA1920: Enterprise iphone and ipad Programming Description This 5 day iphone training course teaches application development for the ios platform. It covers iphone, ipad and ipod Touch devices. This
More informationMobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
More informationMobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
More informationPlease Complete Speaker Feedback Surveys. SecurityTube.net
Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net vivek@securitytube.net Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage
More informationPenetration Testing for iphone / ipad Applications
Penetration Testing for iphone / ipad Applications Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing for iphone / ipad Applications... 1 Table
More informationReminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
More informationBluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies
Bluetooth 4.0 Solutions for Apple ios Devices Bluegiga Technologies Agenda Introduction How to build Bluetooth 4.0 applications Compatible Bluegiga products What is Bluetooth low energy? Summary Introduction
More informationApp Distribution Guide
App Distribution Guide Contents About App Distribution 10 At a Glance 11 Enroll in an Apple Developer Program to Distribute Your App 11 Generate Certificates and Register Your Devices 11 Add Store Capabilities
More informationNative ipad Apps? Why should I care?
June 2012 Native ipad Apps? Why should I care? What makes the ipad (and its sibling the iphone) so special? Why do users seem to love working on the device? The overwhelming reaction to both of these questions
More informationMobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
More informationJonathan Worthington Scarborough Linux User Group
Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.
More informationBest Practices for Testing Mobile Applications. Presented by Frank Schloendorn
Best Practices for Testing Mobile Applications Presented by Frank Schloendorn 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the
More informationGame Design From Concepts To Implementation
Game Design From Concepts To Implementation Giacomo Cappellini - g.cappellini@mixelweb.it What I do I code for video games I code editor tools I code utilities for the production of games I code scripts
More informationios applications reverse engineering Julien Bachmann julien@scrt.ch
ios applications reverse engineering 1 Julien Bachmann julien@scrt.ch Agenda Motivations The architecture Mach-O Objective-C ARM AppStore binaries Find'em Decrypt'em Reverse'em What to look for Where to
More informationPeach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
More informationINTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011
INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011 1 Goals of the Lecture Present an introduction to Objective-C 2.0 Coverage of the language will be INCOMPLETE
More informationIII. The most important things you need to know about iphone app/game development
1 III. The most important things you need to know about iphone app/game development There are lots of people who think they possess the quality to make a fundamental change on Apple s itunes store, but
More informationios Dev Crib Sheet In the Shadow of C
ios Dev Crib Sheet As you dive into the deep end of the ios development pool, the first thing to remember is that the mother ship holds the authoritative documentation for this endeavor http://developer.apple.com/ios
More informationEverything is Terrible
Everything is Terrible A deep dive into provisioning and code signing Hello and welcome to Everything is Terrible. This is a deep dive talk into the processes behind provisioning and code signing on Apple
More informationLab 0 (Setting up your Development Environment) Week 1
ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself
More informationx64 Servers: Do you want 64 or 32 bit apps with that server?
TMurgent Technologies x64 Servers: Do you want 64 or 32 bit apps with that server? White Paper by Tim Mangan TMurgent Technologies February, 2006 Introduction New servers based on what is generally called
More information04/08/2011. Andy Davis Research Director Telephone: +44 (0) 208 401 0070 e-mail: andy.davis@ngssecure.com
04/08/2011 Andy Davis Research Director Telephone: +44 (0) 208 401 0070 e-mail: andy.davis@ngssecure.com NCC Group Plc, Manchester Technology Centre, Oxford Road, Manchester M1 7EF www.nccgroup.com Agenda
More informationAndroid Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
More informationMobile Development Frameworks Overview. Understand the pros and cons of using different mobile development frameworks for mobile projects.
Mobile Development Frameworks Overview Understand the pros and cons of using different mobile development frameworks for mobile projects. Mobile Solution Frameworks One of the biggest technological decisions
More informationObjective C and iphone App
Objective C and iphone App 6 Months Course Description: Understanding the Objective-C programming language is critical to becoming a successful iphone developer. This class is designed to teach you a solid
More informationOverview of CS 282 & Android
Overview of CS 282 & Android Douglas C. Schmidt d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282
More informationXcode Project Management Guide. (Legacy)
Xcode Project Management Guide (Legacy) Contents Introduction 10 Organization of This Document 10 See Also 11 Part I: Project Organization 12 Overview of an Xcode Project 13 Components of an Xcode Project
More informationCOS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
More informationgeniusport mobility training experts
geniu po About Geniusport: GeniusPort is a Pioneer and India's No. 1 Training Center for Mobile Technologies like Apple ios, Google Android and Windows 8 Applications Development. A one stop destination
More informationIntroduction to Android Development. Jeff Avery CS349, Mar 2013
Introduction to Android Development Jeff Avery CS349, Mar 2013 Overview What is Android? Android Architecture Overview Application Components Activity Lifecycle Android Developer Tools Installing Android
More informationMobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
More informationFachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert
Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications
More informationApplication Development for Mobile and Ubiquitous Computing
Department of Computer Science Institute for System Architecture, Chair for Computer Network Application Development for Mobile and Ubiquitous Computing igrocshop Seminar Task - Second Presentation Group
More informationIntroduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
More informationAdobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
More informationimaginea white paper
white paper Building Mobile Android Applications Even though Android was created for handsets, there is a great opportunity for developing other innovative devices on the Android platform with significant
More informationCross-Platform Mobile Apps Solution
Cross-Platform Mobile Apps Solution Prepared by Kevin Mullins CEO and Chief Developer Appracatappra, LLC. 709 Gale Street #8 Seabrook, TX 77586 kmullins@appracatappra.com http://appracatappra.com Table
More informationFrameworks & Android. Programmeertechnieken, Tim Cocx
Frameworks & Android Programmeertechnieken, Tim Cocx Discover thediscover world atthe Leiden world University at Leiden University Software maken is hergebruiken The majority of programming activities
More informationLecture 1 Introduction to Android
These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy
More informationMobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
More informationHow To Write Portable Programs In C
Writing Portable Programs COS 217 1 Goals of Today s Class Writing portable programs in C Sources of heterogeneity Data types, evaluation order, byte order, char set, Reading period and final exam Important
More informationMobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
More informationTablets in Data Acquisition
Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create
More informationEugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
More informationIntroduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
More informationHow To Develop An App For Ios (Windows)
Mobile Application Development Lecture 14 ios SDK 2013/2014 Parma Università degli Studi di Parma Lecture Summary ios operating system ios SDK Tools of the trade ModelViewController MVC interaction patterns
More informationClient Requirement. Master Data Management App. Case Study -
Idhasoft is a global world-class organization providing best-of-breed localized business and technology solutions, with continuous innovation and quality backed by best-in-class people Case Study - Master
More informationios Development Tutorial Nikhil Yadav CSE 40816/60816: Pervasive Health 09/09/2011
ios Development Tutorial Nikhil Yadav CSE 40816/60816: Pervasive Health 09/09/2011 Healthcare iphone apps Various apps for the iphone available Diagnostic, Diet and Nutrition, Fitness, Emotional Well-being
More informationLecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc()
CS61: Systems Programming and Machine Organization Harvard University, Fall 2009 Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() Prof. Matt Welsh October 6, 2009 Topics for today Dynamic
More informationA Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
More informationIntroduction to Programming with Xojo
Introduction to Programming with Xojo IOS ADDENDUM BY BRAD RHINE Fall 2015 Edition Copyright 2013-2015 by Xojo, Inc. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationFormat string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
More informationSmartphone Security Winners & Losers
Smartphone Security Winners & Losers CESARE GARLATI TREND MICRO Session ID: MBS-308 Session Classification: Intermediate Consumerization of IT Consumerization will be the most significant trend affecting
More informationipad, a revolutionary device - Apple
Flash vs HTML5 ipad, a revolutionary device Apple Lightweight and portable Sufficient battery life Completely Wireless Convenient multitouch interface Huge number of apps (some of them are useful) No Flash
More informationios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave david.lindner@nvisium.com 15+ years consulting experience I hack and golf, sometimes at
More informationChoosing a Mobile Application Development Approach
ASEAN Journal of Management & Innovation Vol. 1 No. 1, 69 74 by Stamford International University DOI: 10.14456/ajmi..4 ajmi.stamford.edu Choosing a Mobile Application Development Approach Phyo Min Tun
More informationEmbedded Software development Process and Tools: Lesson-4 Linking and Locating Software
Embedded Software development Process and Tools: Lesson-4 Linking and Locating Software 1 1. Linker 2 Linker Links the compiled codes of application software, object codes from library and OS kernel functions.
More informationAGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
More information01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
More informationMOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA
More informationMi-Forms Release Notes for Release v10.1.2
Mi-Forms Release Notes for Release v10.1.2 Main Product Version: 10.1 Service Release Version: 10.1.2 Date of Release: 01/30/2015 Notes: Mi-Forms is dependent on.net Framework 4.5. Be sure to install the
More informationCSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014
CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages Nicki Dell Spring 2014 What is a Programming Language? A set of symbols and associated tools that translate (if necessary) collections
More informationEnterprise Mobile Application Development: Native or Hybrid?
Enterprise Mobile Application Development: Native or Hybrid? Enterprise Mobile Application Development: Native or Hybrid? SevenTablets 855-285-2322 Contact@SevenTablets.com http://www.seventablets.com
More informationThe "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.
Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationCourse MS10975A Introduction to Programming. Length: 5 Days
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS10975A Introduction to Programming Length: 5 Days
More informationHacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
More informationIntroduction to iphone Development
Introduction to iphone Development Introduction to iphone Development Contents Task 1 2 3 4 Application Runtime Core Architecture and Life-cycles What s in a bundle? The resources in an app bundle Customizing
More informationAndroid on Intel Course Introduction. Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08
Android on Intel Course Introduction Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08 Mobile development on Android Market In Q4 2012, the Android
More informationDefending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
More informationSTEELSERIES FREE MOBILE WIRELESS CONTROLLER USER GUIDE
STEELSERIES FREE MOBILE WIRELESS CONTROLLER USER GUIDE INTRODUCTION Thank you for choosing the SteelSeries Free Mobile Controller! This controller is designed by SteelSeries, a dedicated manufacturer of
More informationOperating System Structures
Operating System Structures Meelis ROOS mroos@ut.ee Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.
More informationMOBILE APPLICATION DEVELOPMENT
MOBILE APPLICATION DEVELOPMENT The search for common ground in a divided market Ben Feigin IN THE BEGINNING MOTOROLA DYNATAC 8000X EARLY SMART PHONES IBM Simon Nokia 9000 Series WHAT IS A SMARTPHONE Semi-Smart:
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More informationChapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationIntroduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
More informationUsing the Raspberry Pi to Prototype the Industrial Internet of Things
Using the Raspberry Pi to Prototype the Industrial Internet of Things Rich Blomseth, Glen Riley, and Bob Dolin Oct 31, 2013 Presented at ARM TechCon, 2013 1 Agenda IoT CommunicaCon Models Requirements
More informationProgramming. Languages & Frameworks. Hans- Pe(er Halvorsen, M.Sc. h(p://home.hit.no/~hansha/?page=sodware_development
h(p://home.hit.no/~hansha/?page=sodware_development Programming O. Widder. (2013). geek&poke. Available: h(p://geek- and- poke.com Languages & Frameworks Hans- Pe(er Halvorsen, M.Sc. 1 ImplementaVon Planning
More informationSandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
More informationBridging the Gap: from a Web App to a Mobile Device App
Bridging the Gap: from a Web App to a Mobile Device App or, so how does this PhoneGap* stuff work? *Other names and brands may be claimed as the property of others. 1 Users Want Mobile Apps, Not Mobile
More informationIntroduction to Embedded Systems. Software Update Problem
Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t
More informationCompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
More informationCross Platform Mobile. -Vinod Doshi
Cross Platform Mobile Application Testing -Vinod Doshi Objective Mobile Application Testing Needs. Challenges Current platform specific tools Cloud Testing Testing Strategies and Recommendations Generic
More informationArticle. One for All Apps in HTML5
One for All Apps The boom of smartphones and tablets in the consumer sector creates new problems for developers of industrial Apps: They have to build Apps quickly that run on any type of smartphone and
More informationPraktikum Entwicklung von Mediensystemen mit
Praktikum Entwicklung von Mediensystemen mit Wintersemester 2013/2014 Christian Weiß, Dr. Alexander De Luca Today Organization Introduction to ios programming Hello World Assignment 1 2 Organization 6
More informationFahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com. 1. Java SDK
PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com Android SDK makes use of the Java SE
More informationApplication of RT-Preempt Linux and Sercos III for Real-time Simulation
Application of RT-Preempt Linux and Sercos III for Real-time Simulation Michael Abel a,b, Luis Contreras a, Prof. Peter Klemm a,b a Institute for Control Engineering of Machine Tools and Manufacturing
More information