Selected Areas in Security & Privacy: Building Secure Mobile Applica:ons (SMA)

Size: px
Start display at page:

Download "Selected Areas in Security & Privacy: Building Secure Mobile Applica:ons (SMA)"

Transcription

1 Selected Areas in Security & Privacy: Building Secure Mobile Applica:ons (SMA) Prof. Dr. rer. nat. Dogan Kesdogan Dipl.- Inform. Mohamed Bourimi University of Siegen, Chair for IT Security, Germany

2 Overview ios PlaGorm Security Development Best Prac:ces Summary

3 Where we are now? Cross-cutting concerns such as Usability/User experience, Performance, Integration, Inter-operability, Group Awareness, etc. Application Layer Design of Privacy App Architecture Emulation Rendering Virtual Machines Android ios OS Layer Compiler & language capabilities Network Access File System Access HW

4 The iphone Mobile Pla3orm (Dwivedi et al. 2010) Perhaps the most influencal mobile device to enter the market in recent years is Apple s iphone. Because of its use of ObjecCve- C, development on the iphone carries the risk of security flaws tradiconally associated with C sooware (classic C vulnerabilices).

5 The iphone Mobile Pla3orm (Dwivedi et al. 2010) However, some of these are masked by the high- level Cocoa Touch APIs, and therefore require special ajen:on (Apple has rela:vely lijle documenta:on available on security best prac:ces in comparaison to HCI guidelines)!

6 The iphone Mobile Pla3orm (Dwivedi et al. 2010) Both the iphone and Mac OS X share the usage of ObjecCve- C and a large part of the Cocoa API. However, a number of components worth nocng are missing or have been changed on the iphone s Cocoa implementacon (Cocoa Touch). Although complete support of Core Data API and Garbage Collec:on are scll absent in the mobile ios (Security!) Some C vulnerabilices: Buffer Overflows and Integer Overflows Format String AYacks

7 C vulnerabilices: Buffer Overflows The buffer overflow is one of the oldest and most well- known exploitable bugs in C. At their most basic level, buffer overflows occur when data is wriyen into a fixed- size memory space, overflowing into the memory around the descnacon buffer (gives an ayacker control over the contents of process memory, potencally allowing for the insercon of hoscle code).

8 C vulnerabilices: Buffer Overflows Although the iphone has some built- in preventacve measures to prevent buffer overflow exploitacon (avoid manual memory management en:rely, and use Cocoa objects such as NSString for string manipula:on), exploits resulcng in code execucon are scll possible (see hyp:// europe- 09/Miller_Iozzo/ BlackHat- Europe Miller- Iozzo- OSX- IPhone- Payloads- whitepaper.pdf).

9 C vulnerabilices: Integer Overflows An integer overflow occurs when a computed value is larger than the storage space it s assigned to. This ooen happens in expressions used to compute the allocacon size for an array of objects because the expression is of the form object_size x object_count. If n is larger than 1 billion (when sizeof(int) is 4), the computed value of sizeof (*x) * n will be larger than 4 billion and will result in a smaller value than intended. This means the allocacon size will be unexpectedly small. When the buffer is later accessed, some reads and writes will be performed past the end of the allocated length, even though they are within the expected limits of the array.

10 C vulnerabilices: Format String AYacks and Double Frees Format string vulnerabilices are caused when the programmer fails to specify how user- supplied input should be formayed, thus allowing an ayacker to specify their own format string. Apple s NSString class does not have support for the %n format string, which allows for wricng to the stack of the running program. C and C++ applicacons can suffer from double- free bugs, where a segment of memory is already freed from use and an ayempt is made to deallocate it again. Typically, this occurs by an extra use of the free() funccon, aoer a previously freed memory segment has been overwriyen with ayacker- supplied data. This results in ayacker control of process execucon. In its most benign form, this can simply result in a crash.

11 Review: iphone Devlopment Develop Test Distribute

12 ios Development VulnerabiliCes Development for the iphone/ios is performed with Xcode and the ios SDK. Code can be run either within the emulator or on a development device (restriccon!). Developing encrypcon funcconality or such funcconality using so- called Keychains or cercficates needs a real device for debugging! ObjecCve- C applicacons decompile fairly cleanly, if you have the right tools (Many Apple developers may be familiar with otool (also proted to ARM), which comes with the OS X developer tools).

13 Further ios Development VulnerabiliCes Example: For versions of the iphone OS 3.x/4.x), you can use the class- dump or class- dump- x tools ( hyp://iphone.freecoder.org/classdump_en.html; also available in Cydia and in MacPorts for OS X) to get very readable informacon on class declaracons and structs from ObjecCve- C object code. For most cases, you ll want to use a jailbroken phone and then ssh into the device to use the iphone version of class- dump- x and/or otool. Another tool that expands on the output of class- dump by resolving addiconal symbols is otx (hyp://otx.osxninja.com).

14 Further ios Development VulnerabiliCes How to prevent reverse engineering of ios Apps? The answer is quite simply: You can t do much. L If someone is mocvated to crack or reverse- engineer your applicacon, they can use far more powerful commercial tools than these to make doing so even easier. But you could make it harder J 1. The development effort required to prevent reverse- engineering costs money, especially if you have to revise your proteccon or obfusca:on mechanisms. 2. Try to hide from some of the aforemenconed mechanisms such as class- dump by pulng your logic into plain C or C++ and ensuring that you strip your binaries.

15 Further ios Security VulnerabiliCes IMEI forwarding can not be easy disabled in ios! Many arccles affirm that ios Apps send IMEI and other sensicve data to CuperCno L (Apple, however, restricted the access to the IMEI in recent ios versions). Apple s Privacy Policy has to be accepted (periodically updated) and Credit Card data have to be communicated to Apple in order to be able to use the App Store (SoluCon for Germany by using third- party payment provider now possible)! Apple has implemented nocficacon services for third- party apps as well as opened up formerly proprietary funcconality (such as the ipod library access) to third- party developers.

16 Summary More generally, it has been speculated that the iphone OS and Mac OS X will gradually merge in the future, as mobile hardware becomes more capable. Under pressure from new contenders such as Android, Apple s Development Agreements will become flexible (and perhaps the followed restriccve philosophy) Many vulnerabilices of the ios mobile pla3orm are due to the underlying C language. Some issues can be solved some not! However, there are many best praccces ;- )

eggon SDK for ios 7 Integration Instructions

eggon SDK for ios 7 Integration Instructions eggon SDK for ios 7 Integration Instructions The eggon SDK requires a few simple steps in order to be used within your ios 7 application. Environment This guide assumes that a standard ios Development

More information

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile

More information

Learn the fundamentals of Software Development and Hacking of the iphone Operating System.

Learn the fundamentals of Software Development and Hacking of the iphone Operating System. Course: Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: Learn the fundamentals of Software Development and Hacking of the iphone Operating System. provides an Instructor-led

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system.

Chapter 1. Introduction to ios Development. Objectives: Touch on the history of ios and the devices that support this operating system. Chapter 1 Introduction to ios Development Objectives: Touch on the history of ios and the devices that support this operating system. Understand the different types of Apple Developer accounts. Introduce

More information

Pentesting iphone Applications. Satishb3 http://www.securitylearn.net

Pentesting iphone Applications. Satishb3 http://www.securitylearn.net Pentesting iphone Applications Satishb3 http://www.securitylearn.net Agenda iphone App Basics App development App distribution Pentesting iphone Apps Methodology Areas of focus Major Mobile Threats Who

More information

Evaluation of Xamarin Forms for MultiPlatform Mobile Application Development

Evaluation of Xamarin Forms for MultiPlatform Mobile Application Development Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2016 Evaluation of Xamarin Forms for MultiPlatform Mobile Application Development Amer A. Radi

More information

Pentesting Mobile Applications

Pentesting Mobile Applications WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer

More information

Advanced ANDROID & ios Hands-on Exploitation

Advanced ANDROID & ios Hands-on Exploitation Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages

More information

Developing Applications for ios

Developing Applications for ios Developing Applications for ios Lecture 1: Mobile Applications Development Radu Ionescu raducu.ionescu@gmail.com Faculty of Mathematics and Computer Science University of Bucharest Content Key concepts

More information

ios Application Development &

ios Application Development & Introduction of ios Application Development & Swift Programming Language Presented by Chii Chang chang@ut.ee Outlines Basic understanding about ios App Development Development environment: Xcode IDE Foundations

More information

Penetration Testing for iphone Applications Part 1

Penetration Testing for iphone Applications Part 1 Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone

More information

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification

More information

MA-WA1920: Enterprise iphone and ipad Programming

MA-WA1920: Enterprise iphone and ipad Programming MA-WA1920: Enterprise iphone and ipad Programming Description This 5 day iphone training course teaches application development for the ios platform. It covers iphone, ipad and ipod Touch devices. This

More information

Mobile Application Security and Penetration Testing Syllabus

Mobile Application Security and Penetration Testing Syllabus Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP

More information

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques

More information

Please Complete Speaker Feedback Surveys. SecurityTube.net

Please Complete Speaker Feedback Surveys. SecurityTube.net Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net vivek@securitytube.net Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage

More information

Penetration Testing for iphone / ipad Applications

Penetration Testing for iphone / ipad Applications Penetration Testing for iphone / ipad Applications Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing for iphone / ipad Applications... 1 Table

More information

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Reminders. Lab opens from today. Many students want to use the extra I/O pins on Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students

More information

Bluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies

Bluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies Bluetooth 4.0 Solutions for Apple ios Devices Bluegiga Technologies Agenda Introduction How to build Bluetooth 4.0 applications Compatible Bluegiga products What is Bluetooth low energy? Summary Introduction

More information

App Distribution Guide

App Distribution Guide App Distribution Guide Contents About App Distribution 10 At a Glance 11 Enroll in an Apple Developer Program to Distribute Your App 11 Generate Certificates and Register Your Devices 11 Add Store Capabilities

More information

Native ipad Apps? Why should I care?

Native ipad Apps? Why should I care? June 2012 Native ipad Apps? Why should I care? What makes the ipad (and its sibling the iphone) so special? Why do users seem to love working on the device? The overwhelming reaction to both of these questions

More information

Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013

Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013 Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone

More information

Jonathan Worthington Scarborough Linux User Group

Jonathan Worthington Scarborough Linux User Group Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.

More information

Best Practices for Testing Mobile Applications. Presented by Frank Schloendorn

Best Practices for Testing Mobile Applications. Presented by Frank Schloendorn Best Practices for Testing Mobile Applications Presented by Frank Schloendorn 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the

More information

Game Design From Concepts To Implementation

Game Design From Concepts To Implementation Game Design From Concepts To Implementation Giacomo Cappellini - g.cappellini@mixelweb.it What I do I code for video games I code editor tools I code utilities for the production of games I code scripts

More information

ios applications reverse engineering Julien Bachmann julien@scrt.ch

ios applications reverse engineering Julien Bachmann julien@scrt.ch ios applications reverse engineering 1 Julien Bachmann julien@scrt.ch Agenda Motivations The architecture Mach-O Objective-C ARM AppStore binaries Find'em Decrypt'em Reverse'em What to look for Where to

More information

Peach Fuzzer Platform

Peach Fuzzer Platform Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested

More information

INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011

INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011 INTRODUCTION TO OBJECTIVE-C CSCI 4448/5448: OBJECT-ORIENTED ANALYSIS & DESIGN LECTURE 12 09/29/2011 1 Goals of the Lecture Present an introduction to Objective-C 2.0 Coverage of the language will be INCOMPLETE

More information

III. The most important things you need to know about iphone app/game development

III. The most important things you need to know about iphone app/game development 1 III. The most important things you need to know about iphone app/game development There are lots of people who think they possess the quality to make a fundamental change on Apple s itunes store, but

More information

ios Dev Crib Sheet In the Shadow of C

ios Dev Crib Sheet In the Shadow of C ios Dev Crib Sheet As you dive into the deep end of the ios development pool, the first thing to remember is that the mother ship holds the authoritative documentation for this endeavor http://developer.apple.com/ios

More information

Everything is Terrible

Everything is Terrible Everything is Terrible A deep dive into provisioning and code signing Hello and welcome to Everything is Terrible. This is a deep dive talk into the processes behind provisioning and code signing on Apple

More information

Lab 0 (Setting up your Development Environment) Week 1

Lab 0 (Setting up your Development Environment) Week 1 ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself

More information

x64 Servers: Do you want 64 or 32 bit apps with that server?

x64 Servers: Do you want 64 or 32 bit apps with that server? TMurgent Technologies x64 Servers: Do you want 64 or 32 bit apps with that server? White Paper by Tim Mangan TMurgent Technologies February, 2006 Introduction New servers based on what is generally called

More information

04/08/2011. Andy Davis Research Director Telephone: +44 (0) 208 401 0070 e-mail: andy.davis@ngssecure.com

04/08/2011. Andy Davis Research Director Telephone: +44 (0) 208 401 0070 e-mail: andy.davis@ngssecure.com 04/08/2011 Andy Davis Research Director Telephone: +44 (0) 208 401 0070 e-mail: andy.davis@ngssecure.com NCC Group Plc, Manchester Technology Centre, Oxford Road, Manchester M1 7EF www.nccgroup.com Agenda

More information

Android Architecture. Alexandra Harrison & Jake Saxton

Android Architecture. Alexandra Harrison & Jake Saxton Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003

More information

Mobile Development Frameworks Overview. Understand the pros and cons of using different mobile development frameworks for mobile projects.

Mobile Development Frameworks Overview. Understand the pros and cons of using different mobile development frameworks for mobile projects. Mobile Development Frameworks Overview Understand the pros and cons of using different mobile development frameworks for mobile projects. Mobile Solution Frameworks One of the biggest technological decisions

More information

Objective C and iphone App

Objective C and iphone App Objective C and iphone App 6 Months Course Description: Understanding the Objective-C programming language is critical to becoming a successful iphone developer. This class is designed to teach you a solid

More information

Overview of CS 282 & Android

Overview of CS 282 & Android Overview of CS 282 & Android Douglas C. Schmidt d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282

More information

Xcode Project Management Guide. (Legacy)

Xcode Project Management Guide. (Legacy) Xcode Project Management Guide (Legacy) Contents Introduction 10 Organization of This Document 10 See Also 11 Part I: Project Organization 12 Overview of an Xcode Project 13 Components of an Xcode Project

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms

More information

geniusport mobility training experts

geniusport mobility training experts geniu po About Geniusport: GeniusPort is a Pioneer and India's No. 1 Training Center for Mobile Technologies like Apple ios, Google Android and Windows 8 Applications Development. A one stop destination

More information

Introduction to Android Development. Jeff Avery CS349, Mar 2013

Introduction to Android Development. Jeff Avery CS349, Mar 2013 Introduction to Android Development Jeff Avery CS349, Mar 2013 Overview What is Android? Android Architecture Overview Application Components Activity Lifecycle Android Developer Tools Installing Android

More information

Mobile Phones Operating Systems

Mobile Phones Operating Systems Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating

More information

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert

Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications

More information

Application Development for Mobile and Ubiquitous Computing

Application Development for Mobile and Ubiquitous Computing Department of Computer Science Institute for System Architecture, Chair for Computer Network Application Development for Mobile and Ubiquitous Computing igrocshop Seminar Task - Second Presentation Group

More information

Introduction to Android

Introduction to Android Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

imaginea white paper

imaginea white paper white paper Building Mobile Android Applications Even though Android was created for handsets, there is a great opportunity for developing other innovative devices on the Android platform with significant

More information

Cross-Platform Mobile Apps Solution

Cross-Platform Mobile Apps Solution Cross-Platform Mobile Apps Solution Prepared by Kevin Mullins CEO and Chief Developer Appracatappra, LLC. 709 Gale Street #8 Seabrook, TX 77586 kmullins@appracatappra.com http://appracatappra.com Table

More information

Frameworks & Android. Programmeertechnieken, Tim Cocx

Frameworks & Android. Programmeertechnieken, Tim Cocx Frameworks & Android Programmeertechnieken, Tim Cocx Discover thediscover world atthe Leiden world University at Leiden University Software maken is hergebruiken The majority of programming activities

More information

Lecture 1 Introduction to Android

Lecture 1 Introduction to Android These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy

More information

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing

More information

How To Write Portable Programs In C

How To Write Portable Programs In C Writing Portable Programs COS 217 1 Goals of Today s Class Writing portable programs in C Sources of heterogeneity Data types, evaluation order, byte order, char set, Reading period and final exam Important

More information

Mobile Application Security Testing ASSESSMENT & CODE REVIEW

Mobile Application Security Testing ASSESSMENT & CODE REVIEW Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran

More information

Tablets in Data Acquisition

Tablets in Data Acquisition Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create

More information

Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows

Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity

More information

How To Develop An App For Ios (Windows)

How To Develop An App For Ios (Windows) Mobile Application Development Lecture 14 ios SDK 2013/2014 Parma Università degli Studi di Parma Lecture Summary ios operating system ios SDK Tools of the trade ModelViewController MVC interaction patterns

More information

Client Requirement. Master Data Management App. Case Study -

Client Requirement. Master Data Management App. Case Study - Idhasoft is a global world-class organization providing best-of-breed localized business and technology solutions, with continuous innovation and quality backed by best-in-class people Case Study - Master

More information

ios Development Tutorial Nikhil Yadav CSE 40816/60816: Pervasive Health 09/09/2011

ios Development Tutorial Nikhil Yadav CSE 40816/60816: Pervasive Health 09/09/2011 ios Development Tutorial Nikhil Yadav CSE 40816/60816: Pervasive Health 09/09/2011 Healthcare iphone apps Various apps for the iphone available Diagnostic, Diet and Nutrition, Fitness, Emotional Well-being

More information

Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc()

Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() CS61: Systems Programming and Machine Organization Harvard University, Fall 2009 Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() Prof. Matt Welsh October 6, 2009 Topics for today Dynamic

More information

A Review of Different Comparative Studies on Mobile Operating System

A Review of Different Comparative Studies on Mobile Operating System Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September

More information

Introduction to Programming with Xojo

Introduction to Programming with Xojo Introduction to Programming with Xojo IOS ADDENDUM BY BRAD RHINE Fall 2015 Edition Copyright 2013-2015 by Xojo, Inc. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com

Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic

More information

Smartphone Security Winners & Losers

Smartphone Security Winners & Losers Smartphone Security Winners & Losers CESARE GARLATI TREND MICRO Session ID: MBS-308 Session Classification: Intermediate Consumerization of IT Consumerization will be the most significant trend affecting

More information

ipad, a revolutionary device - Apple

ipad, a revolutionary device - Apple Flash vs HTML5 ipad, a revolutionary device Apple Lightweight and portable Sufficient battery life Completely Wireless Convenient multitouch interface Huge number of apps (some of them are useful) No Flash

More information

ios Testing Tools David Lindner Director of Mobile and IoT Security

ios Testing Tools David Lindner Director of Mobile and IoT Security ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave david.lindner@nvisium.com 15+ years consulting experience I hack and golf, sometimes at

More information

Choosing a Mobile Application Development Approach

Choosing a Mobile Application Development Approach ASEAN Journal of Management & Innovation Vol. 1 No. 1, 69 74 by Stamford International University DOI: 10.14456/ajmi..4 ajmi.stamford.edu Choosing a Mobile Application Development Approach Phyo Min Tun

More information

Embedded Software development Process and Tools: Lesson-4 Linking and Locating Software

Embedded Software development Process and Tools: Lesson-4 Linking and Locating Software Embedded Software development Process and Tools: Lesson-4 Linking and Locating Software 1 1. Linker 2 Linker Links the compiled codes of application software, object codes from library and OS kernel functions.

More information

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions

AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social

More information

01. Introduction of Android

01. Introduction of Android 01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment

More information

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA

More information

Mi-Forms Release Notes for Release v10.1.2

Mi-Forms Release Notes for Release v10.1.2 Mi-Forms Release Notes for Release v10.1.2 Main Product Version: 10.1 Service Release Version: 10.1.2 Date of Release: 01/30/2015 Notes: Mi-Forms is dependent on.net Framework 4.5. Be sure to install the

More information

CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014

CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014 CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages Nicki Dell Spring 2014 What is a Programming Language? A set of symbols and associated tools that translate (if necessary) collections

More information

Enterprise Mobile Application Development: Native or Hybrid?

Enterprise Mobile Application Development: Native or Hybrid? Enterprise Mobile Application Development: Native or Hybrid? Enterprise Mobile Application Development: Native or Hybrid? SevenTablets 855-285-2322 Contact@SevenTablets.com http://www.seventablets.com

More information

The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.

The Eclipse Classic version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended. Installing the SDK This page describes how to install the Android SDK and set up your development environment for the first time. If you encounter any problems during installation, see the Troubleshooting

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

Course MS10975A Introduction to Programming. Length: 5 Days

Course MS10975A Introduction to Programming. Length: 5 Days 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS10975A Introduction to Programming Length: 5 Days

More information

Hacking your Droid ADITYA GUPTA

Hacking your Droid ADITYA GUPTA Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used

More information

Introduction to iphone Development

Introduction to iphone Development Introduction to iphone Development Introduction to iphone Development Contents Task 1 2 3 4 Application Runtime Core Architecture and Life-cycles What s in a bundle? The resources in an app bundle Customizing

More information

Android on Intel Course Introduction. Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08

Android on Intel Course Introduction. Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08 Android on Intel Course Introduction Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08 Mobile development on Android Market In Q4 2012, the Android

More information

Defending Behind The Device Mobile Application Risks

Defending Behind The Device Mobile Application Risks Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem

More information

STEELSERIES FREE MOBILE WIRELESS CONTROLLER USER GUIDE

STEELSERIES FREE MOBILE WIRELESS CONTROLLER USER GUIDE STEELSERIES FREE MOBILE WIRELESS CONTROLLER USER GUIDE INTRODUCTION Thank you for choosing the SteelSeries Free Mobile Controller! This controller is designed by SteelSeries, a dedicated manufacturer of

More information

Operating System Structures

Operating System Structures Operating System Structures Meelis ROOS mroos@ut.ee Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.

More information

MOBILE APPLICATION DEVELOPMENT

MOBILE APPLICATION DEVELOPMENT MOBILE APPLICATION DEVELOPMENT The search for common ground in a divided market Ben Feigin IN THE BEGINNING MOTOROLA DYNATAC 8000X EARLY SMART PHONES IBM Simon Nokia 9000 Series WHAT IS A SMARTPHONE Semi-Smart:

More information

OPERATING SYSTEM SERVICES

OPERATING SYSTEM SERVICES OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Introduction to Android

Introduction to Android Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified

More information

Using the Raspberry Pi to Prototype the Industrial Internet of Things

Using the Raspberry Pi to Prototype the Industrial Internet of Things Using the Raspberry Pi to Prototype the Industrial Internet of Things Rich Blomseth, Glen Riley, and Bob Dolin Oct 31, 2013 Presented at ARM TechCon, 2013 1 Agenda IoT CommunicaCon Models Requirements

More information

Programming. Languages & Frameworks. Hans- Pe(er Halvorsen, M.Sc. h(p://home.hit.no/~hansha/?page=sodware_development

Programming. Languages & Frameworks. Hans- Pe(er Halvorsen, M.Sc. h(p://home.hit.no/~hansha/?page=sodware_development h(p://home.hit.no/~hansha/?page=sodware_development Programming O. Widder. (2013). geek&poke. Available: h(p://geek- and- poke.com Languages & Frameworks Hans- Pe(er Halvorsen, M.Sc. 1 ImplementaVon Planning

More information

Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers

Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security

More information

Bridging the Gap: from a Web App to a Mobile Device App

Bridging the Gap: from a Web App to a Mobile Device App Bridging the Gap: from a Web App to a Mobile Device App or, so how does this PhoneGap* stuff work? *Other names and brands may be claimed as the property of others. 1 Users Want Mobile Apps, Not Mobile

More information

Introduction to Embedded Systems. Software Update Problem

Introduction to Embedded Systems. Software Update Problem Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t

More information

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required

More information

Cross Platform Mobile. -Vinod Doshi

Cross Platform Mobile. -Vinod Doshi Cross Platform Mobile Application Testing -Vinod Doshi Objective Mobile Application Testing Needs. Challenges Current platform specific tools Cloud Testing Testing Strategies and Recommendations Generic

More information

Article. One for All Apps in HTML5

Article. One for All Apps in HTML5 One for All Apps The boom of smartphones and tablets in the consumer sector creates new problems for developers of industrial Apps: They have to build Apps quickly that run on any type of smartphone and

More information

Praktikum Entwicklung von Mediensystemen mit

Praktikum Entwicklung von Mediensystemen mit Praktikum Entwicklung von Mediensystemen mit Wintersemester 2013/2014 Christian Weiß, Dr. Alexander De Luca Today Organization Introduction to ios programming Hello World Assignment 1 2 Organization 6

More information

Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com. 1. Java SDK

Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com. 1. Java SDK PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com Android SDK makes use of the Java SE

More information

Application of RT-Preempt Linux and Sercos III for Real-time Simulation

Application of RT-Preempt Linux and Sercos III for Real-time Simulation Application of RT-Preempt Linux and Sercos III for Real-time Simulation Michael Abel a,b, Luis Contreras a, Prof. Peter Klemm a,b a Institute for Control Engineering of Machine Tools and Manufacturing

More information