SECURITY IN ANDROID BASED SMARTPHONE
|
|
|
- Ashlynn Harmon
- 10 years ago
- Views:
Transcription
1 SECURITY IN ANDROID BASED SMARTPHONE Mr. Sumedh P. Ingale 1, Prof. Sunil R. Gupta 2 1 ME (CSE),First Year,Department of CSE,Prof. Ram Meghe Institute Of Technology and Research, Badnera,Amravati. Sant Gadgebaba Amravati University, Amarvati, Maharashtra, India Assitantant Professor, Department of CSE, Prof. Ram Meghe Institute Of Technology and Research, Badnera,Amravati. Sant Gadgebaba Amravati University, Amarvati, Maharashtra, India Abstract Now Smartphone s are simply small computers with added services such as GSM, radio. Thus it is true to say that next generations of operating system will be on these Smartphone and the likes of windows, IOS and android are showing us the glimpse of this future. Android has already gained significant advantages on its counterparts in terms of market share. One of the reason behind this is the most important feature of Android is that it is open-source which makes it free and allows any one person could develop their own applications and publish them freely. This openness of android brings the developers and users a wide range of convenience but simultaneously it increases the security issues. The major threat of Android users is Malware infection via Android Application Market which is targeting some loopholes in the architecture mainly on the end-users part. This paper presents the current state of Android security mechanisms and their limitations also identify certain security requirements. Keywords: Android, Android Security, Architechure, Threats, Malware, Smartphone. 1. INTRODUCTION Android is a modern mobile platform that was designed to be truly open. Android applications make use of advanced hardware and software, as well as local and served data, exposed through the platform to bring innovation and value to consumers [1] Developed by the Open Handset Alliance (visibly led by Google), based on Linux platform [2], Android is a widely anticipated open source operating system for mobile devices that provides a base operating system, an application middleware layer, a Java software development kit (SDK), and a collection of system applications. The widespread usage of mobile devices and its increasing functionalities has made both enterprises and consumers to rely on these devices for their daily life. The most innovative feature of Android OS is open source because of which anybody can publish their applications freely on the android market. This openness brings large number of developers which use this platform, but here comes the risk that user is may download and use a malicious software written by network hackers causing harm to its privacy. This demands the study of the Security Mechanisms for Android and on the way make it simple and user understandable making the user aware of areas where he has to be careful. This paper is organized as,first overview of android OS,its architecture and describes the multi layer structure which starts with a Linux core, stucture of android security & its vulnerabilities and study the malware threats present for the android OS. Limitation of security model, then in the end future of android security. 2. ANDROID OVERVIEW The story of the Android mobile operating system began with the release of the Android beta in November 2007.It was designed with keeping both developers and user ease of use the developer can easily develop its idea into and application & user is given visibility over application work.the first commercial version, Android 1.0, was released in September Android is under ongoing development by Google and the Open Handset Alliance (OHA), and has seen a number of updates to its base operating system since its intial release. Since April 2009, Android versions have been developed under a confectionery-themed code name with significant featlowure improvement over time to time is listed below Cupcake (1.5) Bluetooth A2DP, AVRCP support Soft-keyboard with text-prediction Record/watch videos Donut (1.6) Gesture framework Turn-by-turn navigation Eclair ( ) HTML Digital zoom Volume 3, Issue 3, March 2014 Page 370
2 Microsoft Exchange support Bluetooth 2.1 Live Wallpapers Updated UI Froyo ( ) Speed improvements JIT implementation USB Tethering Applications installation to the expandable memory Upload file support in the browser Animated GIF Gingerbread ( ) Updated UI Improved keyboard ease of use Improved copy/paste Improved power management Social networking features Near Field Communication support Native VoIP/SIP support Video call support Honeycomb ( ) Multi core support Better tablet support Updated 3D UI o customizable homescreens o recent applications viewing o redone keyboard layout Media/Picture transport protocol Google Talk video chat Google ebooks "Private browsing" System-wide Clipboard HTTP Live streaming Ice Cream Sandwich ( ) Facial recognition (Face Unlock) UI use Hardware acceleration Better voice recognition (dictating/voice typing) Web browser, allows up to 16 tabs Updated launcher (customizable) Android Beam app to exchange data through NFC Jelly Bean ( ) Google Now Voice Search Speed enhancements Camera app improvements Accessibility: gesture mode, enable braille external keyboards. app stack navigation to define a parent activity in manifest for deep navigation MediaActionSound class to make sounds like when a camera takes a photo NFC supports large payloads over bluetooth WIFI/WIFI-Direct service discovery Large, detailed, multi-action notifications Input manager allows you to query input devices The latest KitKat (4.4) Screen recording New Translucent system UI Enhanced notification access Volume 3, Issue 3, March 2014 Page 371
3 System-wide settings for closed captioning Performance improvements[3] On 3 September 2013 with KITKAT release, Google announced that 1 billion activated devices now use the Android OS worldwide. The most recent major Android update was KitKat 4.4, which was released to commercial devices on 22 November 2013[4,5]. 3. STRUCTURE OF ANDROID 3.1 Architecture With the steady improvement in the android the basic Android System Architecture and Application frameworks remains the same as follows: Fig. android architecture (from Top to Bottom are Application, Application Framework, Libraries & Android Runtime and Linux Kernel ) [6] 1) Application Layer: The application component of the Android operating system is the closest to the end user. This is where the Contacts, Phone, Messaging, and Angry Birds apps live. As a developer, your finished product will execute in this space by using the API libraries and the Dalvik VM.this includes a core application package, such as Client, Web Browser etc. 2) Application Framework Layer: This layer is developed specifically for allowing developers full access to the core application framework used by the API. It consists of a range of services and system structure which include Active Manager, Windows Manager, View system, Contents Provider, Package Manager, Resource Manage, and so on. 3) Libraries and Android Run-time Layer: This layer is mainly associated with the process running. The core library provides most of the features of Java programming language. Additionally, each program of Android has a separate Dalvik s Java virtual machine environment. 4) The fourth layer - Linux kernel: Kernel of Android is Linux 2.6 core which, Similar to a desktop computer running Linux, the Android kernel will take care of power and memory management, device drivers, process management, networking, and security. The Android kernel is available at [7] 3.2 Security Mechanism In Android As we can see the multi layer architecture of android each layer have to deal with its on problem and there prevention mechanism such as Android provides following security features to achieve these objectives by robust security at the operating system level through the Linux kernel, a compulsory application sandbox for all applications, a Secure interposes communication, Application permission mechanism, and Application signing. Techniques of linux security, Dalviks JVM and application specific security mechanisams are tabulated as follows Volume 3, Issue 3, March 2014 Page 372
4 Fig.. ANDROID SYSTEM SECURITY MECHANISM For further reading refer [8] But these prevention measures can be broadly classified into 3 types [9] 1) Privilege Separation (Sandboxing) Mechanism 2) Application Permission Mechanism 3) Signature Mechanism 1)Privilege Separation(sandboxing) : The Android platform takes advantage of the Linux user-based protection as a means of identifying and isolating application resources. The kernel implements a privilege separation model i.e. sandbox when it comes to executing applications. This means that, like on a UNIX system, the Android operating system requires every application to run with its own user identifier (uid) and group identifier (gid). Parts of the system architecture themselves are separated in this fashion. This ensures that applications or processes have no permissions to access other applications or processes. Because the kernel implements privilege separation, it is one of the core design features of Android. The philosophy behind this design is to ensure that no application can read or write to code or data of other applications, the device user, or the operating system itself. This prevents other application from accessing the private information of the application. Unauthorized access to hardware features like GPS, camera or network communication can be prevented using this sandboxing mechanism. As two processes have run in their own sandboxes, the only way they have to communicate with each other is to explicitly request permission to access data thus reinsuring privilege separation [9] 2) Application Permission Mechanism[6,9]:When installing new application, Android prompts the user with the declared permissions required by the application. The user must grant all the requested permissions, in order to install the application. The only possibility for not granting the permissions is not to install the application. Once the permissions are granted and the application is installed it cannot request for further permissions and the user cannot change these permissions, except by uninstalling the application from the device. As a result of granting permission to an application, the application can unrestricted access the respective resources. In the current security model, it is not possible to provide any check on the usage of a resource. This is a major limitation of current security model. 3) Application Code Signing [6, 9]: Any application that is to run on the Android operating system must be signed. Android uses the certificate of individual developers in order to identify them and establish trust relationships among the various applications running in the operating system. The operating system will not allow an unsigned application to execute. Any certification authority to sign the certificate is not required, and Android will happily run any application that has been signed with a self-signed certificate. But Like permissions checks, the certificate check is done only during installation of the application. Therefore, if your developer certificate expires after your application is installed on the device, then the application will continue to execute[6]. 4. VULNERABILITIES IN ANDROID SECURITY The major threat to the android users are the malware present in the open market. They deify the internal security measure and use the loop hole in the security architecture of android, To attack the most insecure part of any system in this case the common user, the simple way of attack is the malware by posing as any other android application getting installed by user permission and then harming the user. But what causes this,is it the Openness of code or the free market or device makers policies are some of the reasons for malware attack. the source code of android is freely available to everyone making more susceptible OS to attack than other os as IOS or Windows that hold their source code (or significant portions of it) closely guarded[9]. The open market comes with question that what should be trusted and what its not android apps are available everywhere making it challenge to monitor them. A app can be translated to local language to make it more likable to user by adding malicious component to attack user. Maker s policies also plays role in android with the questions like where to download patches and update the OS as the policy defers maker to maker. The various approaches used by the hackers to attack android device are as follows : I] Repackaging is one of the most common techniques malware authors use to piggyback malicious payloads into popular applications (or simply apps). In essence, malware authors may locate and download popular apps, disassemble Volume 3, Issue 3, March 2014 Page 373
5 them, enclose malicious payloads, and then re-assemble and submit the new apps to official and/or alternative Android Markets. Users could be vulnerable by being enticed to download and install these infected apps. II] Update Attack The first technique typically piggybacks the entire malicious payloads into host apps, which could potentially expose their presence. The second technique makes it difficult for detection. Specifically, it may still repackage popular apps. But instead of enclosing the payload as a whole, it only includes an update component that will fetch or download the malicious payloads at runtime III] Drive-by Download The third technique applies the traditional drive-by download attacks to mobile space. Though they are not directly exploiting mobile browser vulnerabilities, they are essentially enticing users to download interesting or feature-rich apps.for example when a user clicks a special advertisement link, it will redirect the user to a malicious website, which claims to be analyzing the battery usage of user s phone and will redirect the user to one fake Android Market to download an app claimed to improve battery efficiency. Unfortunately, the downloaded app is not one that focuses on improving the efficiency of battery, but a malware that will subscribe to a premium-rate service without user s knowledge. For futher reading you may refer to [11] 5. LIMITATIONS IN ANDROID SECURITY MODEL Smartphone is security is somewhat sensitive topic than our normal PC protection because the simple fact that the data on our phone is more important to use and contain more important data to the,hence the User need to be more aware about the limitation of the current security model. The android sandbox is app specific it inform user about the permission they need user can accept or reject but the rejection means not installation.[12] The major disadvantage to signature mechanism is that a developer can publish application to the Android market after a self-signing.[12] As absence of central of authority this does not require any certifying authority i.e., developer can use self-created certificates to sign their applications. Since there is no central Certification Authorities in Android, it is very difficult to scrutinize and/or block applications coming from unreliable sources. This process can be exploited to trick an average user to avoid the warning messages at time of installation The permission model discussed previously core mechanism for securing access to various resources in Android. Although the permissions are categorized to different protection level such as Normal, Dangerous, Signature and Signature or System but the assignment of these protection levels are left to the developers will and own understanding. This leads to a number of vulnerabilities in the permission model. Some of the vulnerabilities in the existing permission model arise from the concept of shared user-id mechanism. The shared user-id feature allows one application to leverage the granted permissions to another application sharing the same user-id. In other words when an application with a shared user-id is installed on the mobile device, all of its granted permissions are attributed to the user-id. This way, a combined set of permissions will be granted to the applications sharing the same user-id. Since both applications are installed with a same shared user-id, each one can enjoy access to both the resources. The applications are capable of reading users credentials and sending it via the Internet to any host without the knowledge of the user. However, many applications available in the Android market have declared both the permissions regardless of their need of these permissions that can lead to possible misuse of the respective resources. Some of the vulnerabilities like battery draining, Denial of Service attacks (DoS) and Distributed Denial of Service attacks(ddos) i.e., denying to place phone calls to nonemergency numbers, application termination, and the misuse of billable services such as MMS / SMS messages and phone calls, etc., are examples of some of the prominent attacks on smart phones. For a detail study about these attacks and their possible solution refer to [14]. 6. RECENT TRENDS IN ANDROID To avoid the malware attack Google itself provide cloud services such as Google Play which is collection of services that allow user to discover,install or buy application on their android device in addition it provide community review application license verification, application security scanning and other security services [6], Security Mechanisms need to be made concrete as per the new trends. It is seen the refinements that need to be done in current security models. Hence next work could be to build a security mechanism that could take care of issues that we ve discussed that would refine the permission mechanism to avoid monitor unnecessary access to the resources. Many new frameworks like MADAM[14,15] a multi-level anomaly detector for android malware which concurrently monitors Android at the kernellevel and user-level to detect real malware infections help in making android secure.it is clear that user involvement is greater & important in android security than other mobile phone platform hence user should be made aware of the basic possible threats at the beginning of his android experience. further various frameworks like KIRIN [16], SCanDroid[17], Saint[18], Apex[19] also purposed.[14] 7. CONCLUSIONS The growing popularity of smart phone usage and its wide adoption in the market has given rise to important security concerns. This paper analyzes the security mechanism the most widely used open source smart phone platform Android. Discussed security mechanisms and there limitation. Malware are the major threat to the android user,the best way to Volume 3, Issue 3, March 2014 Page 374
6 avoid them is to make user aware of the security mechanism and how to use them in his benefit and stop malwares at their installation phase. REFERENCES [1] Android Open Source Project.Android Security Overviewhttp://source.android.com/devices/tech/security/index.html [2] Android,at: android.com/.. [3] Android versions comparison at : [4] Android version history at : [5] Android versions at : [6] AndroidSecurityOverview at: [7] Android Reference: Application Fundamentals-Components, available at: [8] Hou Rui, Jin Zhi Gang, Wang Bao Liang, Security Mechanism Analysis of Open-Source Android OS & Symbian OS, [9] Sheran Gunasekera, Android app security Pg.no 9,10,11 [10] The ultimate android guide, available at: [11] Yajin Zhou, Xuxian Jiang. Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy page no 95. [12] Mobile Attacks and Defense, Charlie Miller Accuvant Labs, page no [13] A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C.Glezer,Google android: A comprehensive security assessment, Security & Privacy, IEEE, vol. 8, no. 2, pp. 3544, [14] Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa International Conference on, How Secure is your Smartphone: AnAnalysis of Smartphone Security Mechanisms, International Conference on Cyber Security, Cyber Warfare & Digital Forensic 2012 [15] Dini G., Martinelli F., Saracino A. and Sgandurra D.,MADAM: a multi-level anomaly detector for android Malware [16] W. Enck, M. Ongtang, and P. McDaniel, On lightweight mobile phone application certification, in Proceedings of the 16th ACM conference on Computer and Communications Security. ACM, 2009, pp [17] A. Fuchs, A. Chaudhuri, and J. Foster, Scandroid: Automated security certification of android applications, Manuscript, Univ.ofMaryland, avik/projects/scandroidascaa. [18] M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, Semantically rich application-centric security in android, in 2009 Annual Computer Security Applications Conference. IEEE, 2009, pp [19] M. Nauman, S. Khan, and X. Zhang, Apex: Extending android permission model and enforcement with userdefined runtime constraints, in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010, pp AUTHORS Mr.Sumedh P. Ingale, 1 ME (CSE),First Year,Department of CSE,Prof. Ram Meghe Institute Of Technology and Research, Badnera, Amravati. Sant Gadgebaba Amravati University, Amravati, Maharashtra, India Prof. Sunil R. Gupta, 2 Assitantant Professor, Department of CSE, Prof. Ram Meghe Institute Of Technology and Research, Badnera,Amravati. Sant Gadgebaba Amravati University, Amarvati, Maharashtra, India Volume 3, Issue 3, March 2014 Page 375
Android 5.0: Lollipop OS
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 6, June 2015. www.ijiset.com Android 5.0: Lollipop OS ISSN 2348 7968 Meenakshi M.Tech Student, Department of
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Android v ios Mobile Operating Systems
v ios Mobile Operating Systems is an open source operating system widely used on smartphones and tablets. has been available under a free and open source software license from October 21, 2008 and until
CS378 -Mobile Computing. Android Overview and Android Development Environment
CS378 -Mobile Computing Android Overview and Android Development Environment What is Android? A software stack for mobile devices that includes An operating system Middleware Key Applications Uses Linux
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
Mobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
Programming with Android
Praktikum Mobile und Verteilte Systeme Programming with Android Prof. Dr. Claudia Linnhoff-Popien Philipp Marcus, Mirco Schönfeld http://www.mobile.ifi.lmu.de Sommersemester 2015 Programming with Android
Choosing a Mobile Application Development Approach
ASEAN Journal of Management & Innovation Vol. 1 No. 1, 69 74 by Stamford International University DOI: 10.14456/ajmi..4 ajmi.stamford.edu Choosing a Mobile Application Development Approach Phyo Min Tun
Introduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
ANDROID. Programming basics
ANDROID Programming basics Overview Mobile Hardware History Android evolution Android smartphone overview Hardware components at high level Operative system Android App development Why Android Apps? History
Smartphone market share
Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Workshop on Android and Applications Development
Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
Review On Google Android a Mobile Platform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 21-25 Review On Google Android a Mobile Platform Shyam Bhati 1, Sandeep Sharma
Evolution of Smartphones And Android Operating System
Evolution of Smartphones And Android Operating System Evolution of Smartphones Background First telephone call was made on March 10, 1876 by Alexander Graham Bell. After that Pager continues to dominate
060010702 Mobile Application Development 2014
Que 1: Short question answer. Unit 1: Introduction to Android and Development tools 1. What kind of tool is used to simulate Android application? 2. Can we use C++ language for Android application development?
Issues in Android on Mobile Platform and Their Resolution
Issues in Android on Mobile Platform and Their Resolution 1 Monika A. Ganpate, 2 Dipika R. Shinde 1, 2 Institute of Management and Computer Studies, Thane (West), India, University of Mumbai, India Abstract:
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Android Operating System
Prajakta S.Adsule Student-M.B.A.[I.T.] BharatiVidyapeeth Deemed University,Pune(india) [email protected] Mob. No. 9850685985 Android Operating System Abstract- Android operating system is one
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security
Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Reminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Mobile Exploit Intelligence Project
Mobile Exploit Intelligence Project Dan Guido, Trail of Bits Mike Arpaia, isec Partners Blackberry, 06/2013 Mobile Device Security Thesis Mobile devices are loading up with data E- mail, line of business
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Programming with Android: System Architecture. Dipartimento di Scienze dell Informazione Università di Bologna
Programming with Android: System Architecture Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Android Architecture: An Overview Android Dalvik Java
Development. SriSeshaa Technologies. Table of Contents
SriSeshaa Technologies Development Table of Contents SriSeshaa Android Development... 2 Introduction to Android... 3 SriSeshaa Capabilities... 3 SriSeshaa Android Case Studies... 5 Privacy Guard... 5 Backup
Firewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Firefox OS Features Guide
Firefox OS Features Guide Reviewer s [email protected] Guide [email protected] Contents About Mozilla 1 About Firefox OS 2 Getting Started with Firefox OS 3 Web Apps and Adaptive App Search 17 Privacy
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Security Threats for Mobile Platforms
Security Threats for Mobile Platforms Goran Delac Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia Abstract - The proliferation of smart-phone devices, with ever advancing
Introduction to Android
Introduction to Android Android Smartphone Programming Matthias Keil Institute for Computer Science Faculty of Engineering October 19, 2015 Outline 1 What is Android? 2 Development on Android 3 Applications:
Praktikum Entwicklung Mediensysteme (für Master)
Praktikum Entwicklung Mediensysteme (für Master) An Introduction to Android An Introduction to Android What is Android? Installation Getting Started Anatomy of an Android Application Life Cycle of an Android
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Smart Shopping- An Android Based Shopping Application
Smart Shopping- An Android Based Shopping Application 1 Adarsh Borkar, 2 Madhura Ansingkar, 3 Monali Khobragade, 4 Pooja Nashikkar, 5 Arti Raut 1,2,3,4 Department of Computer Science and Engineering, 5
Modeling the Mobile Application Development Lifecycle
, March 12-14, 2014, Hong Kong Modeling the Mobile Application Development Lifecycle Tejas Vithani, Member, IAENG and Anand Kumar Abstract Software Development Lifecycle is crucial in Desktop or web application
Cell Phone Operating Systems
Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
Android Development Tools for Eclipse
Android Development Tools for Eclipse Sanjay Shah Khirulnizam Abd Rahman Chapter No. 1 "Installing Eclipse, ADT, and SDK" In this package, you will find: A Biography of the author of the book A preview
Google Android: An Emerging Innovative Software Platform For Mobile Devices
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Google Android: An Emerging Innovative Software Platform For Mobile
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
GUI Testing On Android Application
GUI Testing On Android Application Neha J. Jagadale 1 [email protected] Aditi G. Pagar 2 [email protected] Mayuri.S.Deore 3 [email protected] Priti V. Raut 4 Pune, Maharashtra, India
Synthesis for Developing Apps on Mobile Platforms
Synthesis for Developing Apps on Mobile Platforms Jeff Foster University of Maryland, College Park Armando Solar-Lezama Massachusetts Institute of Technology Schedule for session Jeff Foster and Armando
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Firefox for Android. Reviewer s Guide. Contact us: [email protected]
Reviewer s Guide Contact us: [email protected] Table of Contents About Mozilla Firefox 1 Move at the Speed of the Web 2 Get Started 3 Mobile Browsing Upgrade 4 Get Up and Go 6 Customize On the Go 7 Privacy
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Review and Evaluation of Performance Measures in the Mobile Operating Systems
International Journal of Scientific & Engineering Research Volume 4, Issue3, March-2013 1 Review and Evaluation of Performance Measures in the Mobile Operating Systems Farhad Soleimanian Gharehchopogh,
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
Android Operating System:
Android Operating System: An in depth introduction CS423 Project Mohammad Alian, Shuomeng Guang, Bo Teng Outline 1. What is Android 2. History 3. Android architecture 4. Android vs Linux 5. Process Management
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends
How to Run Your Existing Android APK on the Tizen Platform. Chandra Bajpai Matt O Keefe OpenMobile World Wide www.openmobileww.com
How to Run Your Existing Android APK on the Tizen Platform Chandra Bajpai Matt O Keefe OpenMobile World Wide www.openmobileww.com OpenMobile Speakers Chandra Bajpai Vice President of New Technologies Matthew
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps. Hyeokgon Ryu, Infraware Technology, Ltd.
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps Hyeokgon Ryu, Infraware Technology, Ltd. Talking about Needs of Automated Converting from Android To Tizen Introduce
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
Cross-Platform Development
2 Cross-Platform Development Cross-Platform Development The world of mobile applications has exploded over the past five years. Since 2007 the growth has been staggering with over 1 million apps available
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Lecture 1 Introduction to Android
These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
Sony introduces Xperia E An affordable smartphone with HD Voice, data usage monitoring and battery power management
Press Release Sony introduces Xperia E An affordable smartphone with HD Voice, data usage monitoring and battery power management Outstanding call quality through HD Voice and noise cancellation for crystal
Android Mobile App Building Tutorial
Android Mobile App Building Tutorial Seidenberg-CSIS, Pace University This mobile app building tutorial is for high school and college students to participate in Mobile App Development Contest Workshop.
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( [email protected] )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( [email protected] ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
