Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky
|
|
- Claire Bennett
- 7 years ago
- Views:
Transcription
1 Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky
2 Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics How to Circumvent the Pass Code Types Of Analyses(Logical analysis) Types Of Analyses(Physical analysis) Android Partition Layout Custom Recovery Modifications How Data are Stored In Android Example of Useful Data extracted from Android Image 2
3 Mobile Forensic Process Receive device as evidence. Receive request for Intake Identify device specifications & capabilities examination Identify Goals of Examination Identification Prepare methods and tools to be used Prepare media and forensic workstation Preparation Protect the evidence Prevent for examination data destruction Prepare toolsremote to most recent version Isolation Isolate from the Cellular Conduct forensic acquisition network, bluetooth, and Wi-Fi Perform forensic analysis Processing Scan for malware Validate your acquisition Validate your forensic Verification findings Keep notes about your findings and process Documenting Draft and finalize your forensic reports Prepare exhibits Present Keep a gold copy of data in ayour Presentation findings safe place Keep data in common formats Archiving 3 for future
4 Data Acquisition Types Manual Logical Physical 4
5 scenarios The device might be found to be turned off after seizure. have internal or removable memory Locked /unlocked Have access via USB debug mode or not 6
6 Acquisition Guide A-(Unlocked) Airplane Mode SIM ID Cloning Isolate Device from the Network Take the necessary steps to ensure physical device access is possible Remove passcode Enable USB debugging Enable Stay Awake Disable timed screen lock features Acquire supporting media SIM card(s) Media cards Check associated media for device backups Physical Acquisitions 8
7 A1 - Isolate Device from the Network Airplane Mode Remove the SIM card. Place device in a shielded bag, box, tent, or room. 9
8 A 2-Ensure physical device access is possible Enable USB debugging Enable Stay Awake option Disable timed screen lock features 10
9 A3 - Physical Acquisitions Acquire supporting media SIM card(s) Media cards Check associated media for device backups(connected PC or Network) 11
10 Acquisition Guide B-(Locked) 1 Physical access requires that USB debugging mode is enabled. Forensic tools will use custom bootloaders to bypass the passcode if applicable. 2 Acquire supporting media SIM cards Media card(s) 3 Check associated computers and media for device backups Computers and media cards 12
11 Challenges of Android Forensics Access to system partitions is Restricted to The Android OS. Techniques for obtaining root privilege differ depending on Android version, device manufacturer and model. The OS has Authentication mechanisms that uses passwords, tactile patterns or biometric information 13
12 How to Circumvent the Pass Code The smudge attack Flash a New Recovery Partition (Our Solution) Know Gmail user name and password for the device JTAG and Chip-off 14
13 Types Of Analyses(Logical analysis) It is possible to backup all the present data in a cell phone without rooting Using Android Debug Bridge (adb backup command). $ adb backup -apk -shared -system -all -f %1.backup created a backup file which was later converted to.tar archive $ java -jar abe.jar unpack %1.backup %1.tar 15
14 16
15 17
16 18
17 Physical Analysis (Low level analysis ) Low level analysis is based on exact, bit to bit, copy of userdata partition. After the copy, this partition is stored as a single file. which is later used as input for other analysis tools. Only a root user can make such a copy, so the phone must have been rooted at first. 19
18 What is rooting? Process of overcoming limitations imposed by manufacturers on smartphone or tablet owners. Gives an owner the ability to replace and/or alter system applications and settings Run applications requiring administrator-level privileges This includes listing active mounted partitions and cloning them 20
19 Physical analysis(recovery Mode) Another Way to Do Physical Analysis is by using Recovery Rom But first We Are Going to Talk About the Android Partition Layout 21
20 Android Partition Layout boot loader Splash Boot Recovery System Userdata or Data Cache Radio 22
21 Android Partition Layout (Cont.) boot loader: Stores the phone s boot loader program, which takes care of : Initializing the hardware when the phone boots Booting the Android kernel Implementing alternative boot modes such as download mode. boot: Stores the Android boot image, which consists of : Linux kernel(zimage) and the root file system ram disk (initrd). splash: Stores the first splash screen image seen right after powering on the device. 23
22 Android Partition Layout (Cont.) userdata (data): this is the device s internal storage for Application data User files such as: pictures, videos, audio, downloads. This is mounted as /data on a booted system. system: Stores the Android system image that is mounted as /system on a device. Contains the Android framework. Libraries. system binaries. pre-installed applications. 24
23 Android Partition Layout (Cont.) cache: Used to store various utility files such as : recovery logs and update packages downloaded over-the- air. On devices with applications installed on an SD card it may also contain the dalvik-cache folder, which stores the Dalvik Virtual Machine (VM) cache. 25
24 Physical analysis(recovery Mode) It is an operating designed to apply updates format the device perform other maintenance on the devices. The stock recovery mode on most devices is very basic Only provides a number of limited functions Does not provide root privileges in a shell. 26
25 Physical analysis(recovery Mode) Should use extreme caution when installing a custom recovery partition as the process often contains kernel and radio updates Could render the device unusable bricked. Extensive testing must be performed on a lab device first to ensure no issues occur. Examiners should understand what is being modified on the device during the installation of a custom recovery firmware. 27
26 Custom Recovery Rom Examples Cyanogenmod Recovery (clockworkmod) TeamWin (TWRP) 28
27 Custom Recovery Modifications We are going to modify in the Cyanogenmod source code The source code is writen in C Programming language. 29
28 Custom Recovery Modifications Remove Security Pattern The pattern file is at /data/system/gesture.key Other security pattern are in file /data/system/password.key We will also use the pre defined function system. Which will enable us to run Linux commands like ls,rm, etc system("rm /data/system/gesture.key"); //remove the pattern system("rm /data/system/password.key"); // remove any other lock like face or voice or password. 30
29 Custom Recovery Modification Physical imaging In order to do physical imaging you have to run command like dd if = /dev/sda1 of =/media/pc/file.dd Where if is the source(the media whci we want to image). The of is the destination So We have to know: the name of the driver of the source partition (i.e /data or /system) The name of the destination driver (USB Flash for example) 31
30 How To Know The Name Of The Driver For The Source Partition Using the file /etc/recovery.fstab We will search in the /etc/recovery.fstab till we find the driver name equivalent to the partition we want to image 32
31 Who to Know The name Of The Destination Driver (USB Flash for example) Vold: The volume manager daemon. Automatically Mount Sdcard and USB Flash memory (If connected) When Device Startup OR When Connected We are going to search in the Vold till we find USB or SdCard. 33
32 How Data are Stored In Android Android provides developers with five methods for storing data to a device Shared preferences Internal storage External storage SQLite Network 34
33 How Data are Stored In Android(Shared preferences) Allow a developer to store key-value pairs of primitive data types in a lightweight XML format. /data/data/<com.android.contacts>/shared_prefs Used to set the programs configuartion 35
34 How Data are Stored In Android (Internal storage) Contain more complicated data structures. The files are stored in the application s /data/data subdirectory. Files can only be read by the application. Indicate data that may be of interest to a forensic analyst 36
35 How Data are Stored In Android (External storage) Files stored on the internal device s storage have strict security and location parameters. Files on the various external storage devices have far fewer constraints. Emulated SdCard and Actual SdCard Examples Pictures,Videos,,etc 37
36 How Data are Stored In Android (SQLite) Databases are used for structured data storage SQLite is a popular database format appearing in many mobile systems traditional operating systems. /data/data/<packagename>/databases. SQLite databases are a rich source of forensic data. 38
37 How Data are Stored In Android (Network) Very few applications took advantage of the network as a storage option. The Android Developer web site provides very few details for those interested in network storage. You can use the network (when it is available) to store and retrieve data on your own web-based services. Dropbox Google Drive Onedrive 39
38 Example of Useful Data extracted from Android Image Android Browser Password / data/data/com.android.browser/databases/webview.d b.table select * from password; data/com.android.chrome/app_chrome/default/login Open Login Data file using txt viewer /data/misc/wifi/ Open wpa_supplicant.conf file using txt viewer. 40
39 References Android Forensics by Andrew Hoog Android Hacker's Handbook Joshua J. Drake,Pau Oliva Fora,Zach Lanier,Collin Mulliner,Stephen A. Ridley andgeorg Wicherski Developing Process for Mobile Device Forensics Cynthia A. Murphy Android Forensics, Part 1: How we recovered (supposedly) erased data
Android Physical Extraction - FAQ
Android Physical Extraction - FAQ Nadav Horesh June, 2012 1 Table of Contents Introduction... 3 Android Debugging Bridge (ADB)... 4 Q: What does ADB stand for and how does it work?...4 Q: So can ADB be
More informationSecurity Issues in Android Custom ROMs
Security Issues in Android Custom ROMs HTML Version Anant Shrivastava http://anantshri.info Contents Abstract... 3 Introduction to Android... 3 What is Android ROM... 3 Types of ROM... 4 Advantages of
More informationProf. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece
Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece University of Piraeus, Greece Department of Digital Systems System Security Laboratory founded
More informationInto The Droid. Gaining Access to Android User Data DEF CON 20
Into The Droid Gaining Access to Android User Data DEF CON 20 Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company
More informationWhat Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationIntroduction to Android. CSG250 Wireless Networks Fall, 2008
Introduction to Android CSG250 Wireless Networks Fall, 2008 Outline Overview of Android Programming basics Tools & Tricks An example Q&A Android Overview Advanced operating system Complete software stack
More informationHow to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
More informationFile System. /boot /system /recovery /data /cache /misc. /sdcard /sd-ext. Also Below are the for SD Card Fie System Partitions.
Android File System Babylon University, IT College, SW Dep., Android Assist. Lecturer : Wadhah R. Baiee (2014) Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch6, John Wiley & Sons, 2012
More informationA Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
More informationAnalysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
More informationAndroid Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino andrea.saracino@iet.unipi.it Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationEXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
More informationHacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
More informationAndroid Security for Enterprise App Developers Jon Preedy
Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption
More informationPentesting Android Mobile Application
Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.
More informationCS378 -Mobile Computing. Android Overview and Android Development Environment
CS378 -Mobile Computing Android Overview and Android Development Environment What is Android? A software stack for mobile devices that includes An operating system Middleware Key Applications Uses Linux
More informationAndroid Device Storage Using SkyReader
Overview Basics File Source Starting Screen View Files and Folders Edit Operation List of File Source Local Protected Files Favorites Photo Library External Storage Dropbox Google Drive SkyDrive Bluetooth
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationAre free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
More informationUNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)
Android Syllabus Pre-requisite: C, C++, Java Programming JAVA Concepts OOPs Concepts Inheritance in detail Exception handling Packages & interfaces JVM &.jar file extension Collections HashTable,Vector,,List,
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationMobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
More informationCase Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationOverview. The Android operating system is like a cake consisting of various layers.
The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and
More informationAcquisition of digital evidence in android smartphones
Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2011 Acquisition of digital evidence in android smartphones Andre Morum de L. Simao
More informationRecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationDeveloping for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
More informationRunning a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
More informationLinux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
More informationKINDLE FORENSICS: ACQUISITION & ANALYSIS
KINDLE FORENSICS: ACQUISITION & ANALYSIS Peter Hannay SECAU School of Computer and Security Science Edith Cowan University Perth, Australia p.hannay@ecu.edu.au Abstract The Amazon Kindle ebook reader supports
More informationAdvanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
More informationFive standard procedures for building the android system. Figure1. Procedures for building android embedded systems
Standard Operating Procedures for Android Embedded Systems Anupama M. Kulkarni, Shang-Yang Chang, Ying-Dar Lin National Chiao Tung University, Hsinchu, Taiwan November 2012 Android is considered to be
More informationAcronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Windows... 3 1.1.2 Management
More informationAcronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
More informationInformatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone
Informatica forense Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone A cura di Matteo Brunati Udine, 11 maggio 2015 Me, Myself & I IT Security consultant Design & development
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationDesign and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
More informationSTUDY GUIDE CHAPTER 4
STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface
More informationAndroid Development. Marc Mc Loughlin
Android Development Marc Mc Loughlin Android Development Android Developer Website:h:p://developer.android.com/ Dev Guide Reference Resources Video / Blog SeCng up the SDK h:p://developer.android.com/sdk/
More informationCase Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
More informationUniversity of Rochester Sophos SafeGuard Encryption for Windows Support Guide
Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4
More informationOperating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
More informationComputer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland andras.nemeth@students.oamk.fi ABSTRACT This paper provides an overview
More informationAn Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student katsarakis@csd.uoc.gr Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
More informationAdditional details >>> HERE <<<
Additional details >>> HERE http://dbvir.com/sdrecovery/pdx/palo3415/
More informationMobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
More informationChapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
More informationWindows 8 Backup, Restore & Recovery By John Allen
Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot
More informationUpgrading Cisco UCS Central
This chapter includes the following sections: to Release 1.3, page 1 to Release 1.3 You can upgrade Cisco UCS Central release 1.1(2a) or 1.2 to 1.3 in either standalone or cluster mode. If you are already
More informationIntroduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationShort Manual Intellect v.4.7.6 SP2 module Unipos Contents:
Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: 1. Software Installation... 2 2. Hardware Configuration... 12 3. System Dispatching... 14 3.1. Create dispatching objects... 14 3.2. Graphical
More informationNotes on Windows Embedded Standard
Q10WCPU-W1-E Q10WCPU-W1-CFE Notes on Windows Embedded Standard This document shows the notes on using Windows Embedded Standard of OS-installed model. CAUTION - Company names and product names used in
More informationMobile Application Security Sharing Session May 2013
Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers
More informationColorfly Tablet Upgrade Guide
Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be
More informationAcronis Backup & Recovery 10 Server for Linux. Quick Start Guide
Acronis Backup & Recovery 10 Server for Linux Quick Start Guide Table of contents 1 Supported operating systems...3 2 What you need to get started...3 3 Installing and starting to use the product...3 3.1
More informationIntroduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
More informationMobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
More informationFree Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) 250-1089 bob3160@gmail.com Presentations started on Dec 1, 2010 in AZ
Free Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) 250-1089 bob3160@gmail.com Presentations started on Dec 1, 2010 in AZ So You ve got a New Computer Now What? I promised I would
More informationHP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active
HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services
More informationNetwork Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
More informationAndroid Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
More informationUniversità Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
More informationHow to Restore a Linux Server Using Bare Metal Restore
How to Restore a Linux Server Using Bare Metal Restore This article refers to firmware version 5.4 and higher, and the Barracuda Linux Backup Agent 5.4 and higher. Use the steps in this article to restore
More informationChapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
More informationPost-Mortem Memory Analysis of Cold-Booted Android Devices
Post-Mortem Memory Analysis of Cold-Booted Android Devices Christian Hilgers Holger Macht Tilo Müller Michael Spreitzenbarth FAU Erlangen-Nuremberg Chair of Computer Science 1 Prof. Felix Freiling IMF
More informationLSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
More informationVMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
More informationANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
More informationM100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
More informationGetting started 7. Designing interfaces 27
Contents Contents 1 2 3 Getting started 7 Introducing Android 8 Installing Java 10 Installing App Inventor 12 Beginning your first app 14 Adding components 16 Adding behavior 18 Preparing devices 20 Running
More informationWhat the student will need:
COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use
More informationAn Introduction to Android. Huang Xuguang Database Lab. Inha University 2009.11.2 Email: xuguanghuang@yahoo.cn
An Introduction to Android Huang Xuguang Database Lab. Inha University 2009.11.2 Email: xuguanghuang@yahoo.cn Outline Background What is Android? Development for Android Background Internet users and Mobile
More informationAllJoyn Android Environment Setup Guide
80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;
More informationReminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
More informationVOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0
VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all
More informationSmartphone market share
Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationwww.planetcellinc.com
CONFIDENTIALITY NOTICE: This presentation, and any documents, files or previous e-mail messages attached to it may contain information that is proprietary, confidential, legally privileged or protected
More informationThis guide describes features that are common to most models. Some features may not be available on your tablet.
User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Android, AdWords, Gmail,
More informationAcronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
More information"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
More informationBare Metal Recovery Quick Start Guide
Bare Metal Recovery Quick Start Guide Revisions Document Control Version 5.4.3 Status Changes Date Final Created. August 2014 Copyright 2003-2014 Intronis, Inc. All rights reserved. 1 Table of Contents
More informationDigital Forensics Tutorials Acquiring an Image with Kali dcfldd
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can
More informationGraduate presentation for CSCI 5448. By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
More informationUSB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
More informationSmartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved
Smartphone Security A Holistic view of Layered Defenses David M. Wheeler, CISSP, CSSLP, GSLC 1 The Smartphone Market The smartphone security market is expected to grow at a rate of 44 percent annually
More informationChapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
More informationDiscovering authentication credentials in volatile memory of Android mobile devices
Discovering authentication credentials in volatile memory of Android mobile devices Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis Department of Digital Systems,
More informationHow To Get A Memory Card From A Usb To A Microsoft Card (Gsm) For Free On A Microsatellite) For A Microsd Card (Powerbook) For Your Computer Or Ipad Or Ipa (Powerstation) For
More details >>> HERE
More informationThat Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
More information