Android Security. Giovanni Russello
|
|
|
- Martha Bates
- 10 years ago
- Views:
Transcription
1 Android Security Giovanni Russello
2 N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional concern Moreover Security a cross-cutting concern
3 Specification Vs. Enforcement Security can affect several parts of application code However it is the enforcement that needs to be spread over the application code Specification of security policies can be done in more concise and precise way
4 Android Security Specification Android allows app developers to specify the security needs of their apps Each app comes with a Manifest file where the permissions listing the required permissions The user of the device has only two choices Either install the app granting the whole set of permissions Or not install the app All-or-nothing model!
5 Android Permission Levels Android provides a set of well-defined permissions Normal Permissions are assigned by default to apps Dangerous Permissions require user confirmation Signature Permissions are granted to apps signed by the same developer System or Signature Permissions are granted only to special apps installed in the data/system folder (i.e., apps signed by Google)
6 Permission example An app that wants to listen for incoming SMS has to declare in its manifest: <uses-permission android:name=android.permission.receive_sms"/> The RECEIVE_SMS is consider a dangerous permission and the apps has to request it
7 Android Security Enforcement Android supports a security model that is enforced by two layers: Linux and Android middleware Linux enforces the DAC model Android middleware enforces a MAC model
8 Linux DAC in Android When an app is installed it gets a unique UID and GID Each app gets a home dir /data/data/<package_name>/ The UID and GID of the app get full access to its home dir and the files it contains rwx,rwx,---
9 Linux Special Groups Linux also maintains special groups for the Internet, External Storage, and Bluetooth If an app asks for accessing Internet it is assigned to the Internet Group Similarly for the other two groups/permissions
10 Android Middleware MAC The Android Middleware controls the way in which apps use the ICC mechanism Each protected feature that is reachable through the ICC mechanism is assigned a label When the app asks for a permission in its manifest the corresponding label is assigned to the app
11 Android MAC Model Activity Manager Android Middleware Reference Monitor
12 Protection Domain S1 = Location Service P1 = LOCATION_PERMISSION System Sandbox Android Apps P1 P2 S1 S2 Activity Manager Android Middleware Reference Monitor
13 Assignment of Permissions Install Time: Uses Permission = P1? Sandbox System Sandbox C A App A B S Android Apps P1 P2 S1 S2 Activity Manager Android Middleware Reference Monitor
14 Using the Permission Sandbox P1 System Sandbox C A App A B S Android Apps P1 P2 S1 S2 Activity Manager Android Middleware Reference Monitor
15 Reference Monitor Sandbox P1 System Sandbox C A App A B S Android Apps P1 P2 S1 S2 Activity Manager Android Middleware Reference Monitor
16 Security Confinement Once the labels are assigned neither the app nor the user can change them Apps cannot delegate their permissions However, components can expose interfaces to other apps This makes difficult in standard Android to control information flow (can lead to severe attacks)
17 Android Security Refinements Android Security Model allows developers to refine the security domain of their applications Through the standard mechanism using the Manifest Programmatically by using special parameters in the API Bad move!!! Make everything murky and worst of all by default access is granted!!
18 Public vs Private Components By default any components that is not assigned a permission is public Developers can declare a component private by setting the exported flag to false in the manifest file Private components can only be accessed by other components in the same app Android can also infer if a component is private by other declarations in the manifest file (Do you trust it??)
19 Implicitly Open Components Public components have all their interface accessible to any other components Developers must explicitly assign permission labels to protect those interfaces
20 Broadcast Intent Protection When an intent is broadcasted, all installed apps are able to listen to those events This mechanism can be exploited by malicious apps that are listening for a certain event to happen It is possible to protect the intent programmatically: sendbroadcast(intent, perm.myperm) This means that the Manifest does not provide a complete view of app security
21 Service Hooks Android does not support a fine-grained mechanism to protect the interface of a Service Once a component has the permission label to access a service, the component can start, stop, bind the service Again programmatically it is possible to refine this mechanism by doing some extra checking at the code level, putting security policies in the app code Not a good security and software eng. practice!
22 Delegation Pending Intents that delegate to another app the parameters and time when an action is executed Location service notifies registered apps when location changes URI delegation where an app delegates a component to perform an action on a resource The app provides a capability to the component for performing the action Per se, there is nothing wrong with delegation. However, it deviates from the main MAC model
23 Concluding The Android security is based on two enforcement layers: Linux DAC Android Middleware MAC Specification is done mainly through the Manifest file
24 Main Drawbacks Specification can be done programmatically Source code injection Open default policy Developers have explicitly protect apps interfaces Delegation No support for information flow control
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
An In-Depth Introduction to the Android Permission Model and How to Secure Multi-Component Applications. OWASP 3 April 2012 Presented at AppSecDC 2012
An In-Depth Introduction to the Android Permission Model and How to Secure Multi-Component Applications Jeff Six jeffsix.com 3 April 2012 Presented at AppSecDC 2012 Copyright The Foundation Permission
A qbit on Android Security
A qbit on Android Security Sergey Gorbunov One of the problems with modern desktop operating system is that there is no isolation between applications and the system. As we saw in class, a buggy application
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Android Developer Fundamental 1
Android Developer Fundamental 1 I. Why Learn Android? Technology for life. Deep interaction with our daily life. Mobile, Simple & Practical. Biggest user base (see statistics) Open Source, Control & Flexibility
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Android Security Extensions
Android Security Extensions Android Security Model Main objective is simplicity Users should not be bothered Does the user care? Most do not care until its too late But We do It needs a more advanced security
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
Android Security Joshua Hodosh and Tim Leek
Android Security Joshua Hodosh and Tim Leek This work is sponsored under Air Force contract FA8721-05-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Android Security for Enterprise App Developers Jon Preedy
Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Android Fundamentals 1
Android Fundamentals 1 What is Android? Android is a lightweight OS aimed at mobile devices. It is essentially a software stack built on top of the Linux kernel. Libraries have been provided to make tasks
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration Tester. Responsible for securing a large suite mobile apps
Tony Trummer Staff Engineer, Information Security at LinkedIn Penetration tester and mobile security enthusiast #3 in Android Security Acknowledgements Tushar Dalvi Sr. Security Engineer at LinkedIn Penetration
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
Firewall-based Solution for Preventing Privilege Escalation Attacks in Android
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Synthesis for Developing Apps on Mobile Platforms
Synthesis for Developing Apps on Mobile Platforms Jeff Foster University of Maryland, College Park Armando Solar-Lezama Massachusetts Institute of Technology Schedule for session Jeff Foster and Armando
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
Jordan Jozwiak November 13, 2011
Jordan Jozwiak November 13, 2011 Agenda Why Android? Application framework Getting started UI and widgets Application distribution External libraries Demo Why Android? Why Android? Open source That means
Google Apps Sync for Microsoft Outlook
Sync for Microsoft Sync for Microsoft is a plug-in for 2003, 2007, or 2010 that lets you use your familiar interface to manage your mail, calendar, and contacts It also lets you import data from to your
How to Set Up Your PC for Android Application Development
Introduction Application Note How to Set Up Your PC for Android Application Development Supported Environments: Windows 7 (32/64 bit), Windows Vista (32/64 bit), Windows XP * This application note was
Security Enhanced (SE) Android: Bringing Flexible MAC to Android
Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov Abstract The Android software
Open Source Telemedicine Android Client Development Introduction
Open Source Telemedicine Android Client Development Introduction Images of phone in this presentation Google. All rights reserved. This content is excluded from our Creative Commons license. For more information,
Semantically Rich Application-Centric Security in Android
Semantically Rich Application-Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel Department of Computer Science and Engineering The Pennsylvania State University,
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
An extension to the Android access control framework
An extension to the Android access control framework Master s Thesis Qing Huang Supervisor: Ludwig Seitz, SICS Examiner: Nahid Shahmehri, IDA October 2011 Abstract Several nice hardware functionalities
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Cloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Google Apps Sync for Microsoft Outlook
Sync for Microsoft Sync for Microsoft is a plug-in for Microsoft 2003, 2007, or 2010 that lets you use to manage your mail, calendar, and contacts, along with your tasks, notes, and journal entries It
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean Course Description Getting Started with Android Programming is designed to give students a strong foundation to develop apps
WWW.SANS.ORG. Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015
Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015 This article introduces the SANS SEC575 mobile 'App Report Cards' project and provides details on
SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov
Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real
Android. Mobile Computing Design and Implementation. Application Components, Sensors. Peter Börjesson
Android Application Components, Sensors Mobile Computing Design and Implementation Peter Börjesson Application Sandbox Android System & Device Data Contacts, Messages, SD Card, Camera, Bluetooth, etc.
Lecture 2 PLATFORM SECURITY IN ANDROID OS
Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation
Practical and Lightweight Domain Isolation on Android
Practical and Lightweight Domain Isolation on Android Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi,, Bhargava Shastry Technische Universität Darmstadt Darmstadt, Germany
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile
Google Apps Engine. G-Jacking AppEngine-based applications. Presented 30/05/2014. For HITB 2014 By Nicolas Collignon and Samir Megueddem
Google Apps Engine G-Jacking AppEngine-based applications Presented 30/05/2014 For HITB 2014 By Nicolas Collignon and Samir Megueddem Introduction to GAE G-Jacking The code The infrastructure The sandbox
Access Control Fundamentals
C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Penetration Testing Scope Factors
1 NZ PAPER LINUX AND WEB APPLICATION SECURITY Penetration Testing Scope Factors April 20, 2013 Zeeshan Khan NZPAPER.BLOGSPOT.COM 2 Abstract: This paper contains the key points of penetration testing. All
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux 2.2.2 (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or
Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation Leandro Fiorin, Alberto Ferrante Konstantinos Padarnitsas, Francesco Regazzoni University of Lugano Lugano, Switzerland
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
WILL ANDROID TROJAN, WORM OR ROOTKIT SURVIVE IN SEANDROID AND CONTAINERIZATION?
WILL ANDROID TROJAN, WORM OR ROOTKIT SURVIVE IN SEANDROID AND CONTAINERIZATION? Rowland YU and William Lee Sophos Email: [email protected], [email protected] Abstract SEAndroid and containerization
How to Set Up Your PC for Android Application Development
Introduction Application Note How to Set Up Your PC for Android Application Development Supported Environments: Windows 7 (32/64-bit), Windows Vista (32/64-bit), Windows XP * This application note was
Android Commercial Spyware Disease and Medication
Android Commercial Spyware Disease and Medication By Eng. Mustafa Saad Computer Engineer 2003 Mobile App Developer 2011 Mobile Security Researcher 2012 Udemy Premium Instructor 2014 March 2016 Agenda Introduction.
Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients.
Android: Setup Hello, World: Android Edition due by noon ET on Wed 2/22 Ingredients. Android Development Tools Plugin for Eclipse Android Software Development Kit Eclipse Java Help. Help is available throughout
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
DETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Android Tutorial. Larry Walters OOSE Fall 2011
Android Tutorial Larry Walters OOSE Fall 2011 References This tutorial is a brief overview of some major concepts Android is much richer and more complex Developer s Guide http://developer.android.com/guide/index.html
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Gmail setup for administrators
Gmail setup for administrators In this guide 1. Turn on features in your Admin console 2. Import your old emails 3. Use labels and search 4. Add your signature 5. Use Gmail with a secondary email address
Cloudy with a chance of 0-day
Cloudy with a chance of 0-day November 12, 2009 Jon Rose Trustwave [email protected] The Foundation http://www.owasp.org Jon Rose Trustwave SpiderLabs Phoenix DC AppSec 09! Tom Leavey Trustwave SpiderLabs
Junos WebApp Secure 5.0.0-10 (formerly Mykonos)
Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net April, 2013 Juniper Networks, Inc.
Beginning Android Programming
Beginning Android Programming DEVELOP AND DESIGN Kevin Grant and Chris Haseman PEACHPIT PRESS WWW.PEACHPIT.COM C Introduction Welcome to Android xii xiv CHAPTER 1 GETTING STARTED WITH ANDROID 2 Exploring
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Developing Mobile Device Management for 15 million devices (case study) Rim KHAZHIN
Developing Mobile Device Management for 15 million devices (case study) whoami software architect @ btt ltd space technologies research institute Ericsson mobility world underwater photographer why am
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Tizen Web Runtime Update. Ming Jin Samsung Electronics
Tizen Web Runtime Update Ming Jin Samsung Electronics Table of Contents Quick Overview of This Talk Background, Major Updates, Upcoming Features What Have Been Updated Installation/Update Flow, WebKit2,
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( [email protected] )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( [email protected] ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
Aneka Dynamic Provisioning
MANJRASOFT PTY LTD Aneka Aneka 2.0 Manjrasoft 10/22/2010 This document describes the dynamic provisioning features implemented in Aneka and how it is possible to leverage dynamic resources for scaling
Mobile Platform Architecture Review: Android, iphone, Qt
Mobile Platform Architecture Review: Android, iphone, Qt Michael Lettner, Michael Tschernuth, and Rene Mayrhofer Upper Austria University of Applied Sciences, Research and Development Softwarepark 11,
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Danger of Proxy ARP in IX environment version 0.3. Maksym Tulyuk [email protected]
Danger of Proxy ARP in IX environment version 0.3 Maksym Tulyuk [email protected] RIPE 63. Vienna 03 November 2011 Content 1. The Outage 2. Analysis and improvements 3. Useful tools and procedures
2009-12-26 PST_WEBZINE_0X04. How to solve XSS and mix user's HTML/JavaScript code with your content with just one script
ACS - Active Content Signatures By Eduardo Vela Nava ACS - Active Content Signatures How to solve XSS and mix user's HTML/JavaScript code with your content with just one script Eduardo Vela Nava ([email protected])
Flexible Data-Driven Security for Android
Flexible Data-Driven Security for Android Denis Feth Fraunhofer Institute for Experimental Software Engineering IESE Kaiserslautern, Germany [email protected] Alexander Pretschner Karlsruhe
How To Develop An App For Ios (Windows)
Mobile Application Development Lecture 14 ios SDK 2013/2014 Parma Università degli Studi di Parma Lecture Summary ios operating system ios SDK Tools of the trade ModelViewController MVC interaction patterns
Software Asset Management (SWAM) Capability Description
Software Asset Management (SWAM) Capability Description Purpose Provides an organization visibility into the software installed and operating on their network(s) so they can appropriately manage authorized
