RV-Droid: Runtime Verification and Enforcement for Android Applications

Size: px
Start display at page:

Download "RV-Droid: Runtime Verification and Enforcement for Android Applications"

Transcription

1 RV-Droid: Runtime Verification and Enforcement for Android Applications Yliès Falcone, Sebastian Currea, Mohamad Jaber Laboratoire d Informatique de Grenoble - VASCO Team - University of Grenoble, Université Joseph Fourier 3 rd International Conference on Runtime Verification Istanbul, Turkey 26 September, 2012 Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 1 / 28

2 Android Andy Rubin: 900 K activations per day Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 2 / 28

3 Android today 1 Android s market shares: 2 Moore s and Koomey s laws for mobile devices comscore Reports. U.S. mobile subscriber market share, April 2012 Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 3 / 28

4 Reliability of Android applications... can be improved The Rise of Android s malwares... Android malware increased by 472% no upfront validation process Android will remain the 1 st target of mobile malware writers Trent Nouveau, TG Daily, Nov 2011 Developing Android applications is difficult: complex communication scheme between activities complex life-cycle partial compatibility with JRE and some existing libraries several bugged and unprotected applications resource consumption and user-experience can be negative Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 4 / 28

5 Proposed solution: monitoring of Android applications Using dynamic validation techniques to enhance confidence in the behavior of (untrustworthy) applications Two processes over the runtime behavior checking some properties enforcing some properties (up to the observability & controllability provided by the instrumentation technique) Modify applications to incorporate monitors observe calls to the unified Android API and analyse parameters decide whether the properties are satisfied/violated (runtime oracle) correct the behavior by disabling some actions or modifying their return value Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 5 / 28

6 Dynamic Validation Techniques needs Instrumentation Most successful one is Aspect-Oriented Programming identify special locations in the the execution of the system execute code when those locations are reached Unfortunately current AOP is not (fully) compatible with Android constraints seriously hinders mobility possible only for self-developed applications (plugged to the computer or within the emulator) incompatibility between.apk files and aspect compilers Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 6 / 28

7 Outline 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 7 / 28

8 RV-Droid: platform Overview of RV-Droid User select application & property embedded monitor synthesis & integration RV-Droid Java-MOP RuleR RV cloud property repository application repository upload & download application & property monitor request property & application result monitored application cloud monitor synthesis & integration Java-MOP RuleR property repository app. repository upload & download (monitored) application & Property Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 8 / 28

9 RV-Droid: screenshot Overview of RV-Droid Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 9 / 28

10 Overview of RV-Droid RV-Droid: screenshot (ctd) Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 10 / 28

11 Overview of RV-Droid RV-Droid: features Features: stand-alone application does not require any modification to the Android OS applications are retrieved off-the-shelf For flexibility, all the involved processes can be done: embedded on the device in the cloud (web service with a configurable IP) Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 11 / 28

12 Outline A Tour of Examples 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 12 / 28

13 Outline A Tour of Examples Verifying Android Development Good Practices 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Android development good practices Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 13 / 28

14 A Tour of Examples Verifying Android Development Good Practices Android Development Good Practices P1 Before transmitting any data, it must be ensured that the device is connected to internet. And, it should be checked again each time the device is moved. P2 All methods involved in the activity lifecycle should be overridden. P3 The device rotation facility should not be disabled. P4 Only one dialogue window should be poped-up. P5 In the restricted-memory mode, an application should start at most one service and end it, and not let the Dalvik virtual machine kill it. Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 14 / 28

15 A Tour of Examples Verifying Android Development Good Practices Check Internet Connection before Transmitting P1 Before transmitting any data, it must be ensured that the device is connected to internet. (And, it should be checked again each time the device is moved.) check internet check internet 1 2 transmit transmit Error [gps old == gps] transmit check internet gps old := gps check internet 1 2 gps old := gps transmit Error [gps old gps] transmit Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 15 / 28

16 A Tour of Examples Verifying Android Development Good Practices Lifecyle Methods should be Overridden P2 All methods involved in the activity lifecycle should be overridden. 1 Observes the execution of these methods in the (implemented) application 2 Tracking the (simplified) application lifecycle: create start resume restart, create pause resume create stop destroy Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 16 / 28

17 Outline A Tour of Examples Enforcing Security Properties 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Security Properties Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 17 / 28

18 A Tour of Examples Enforcing Security Properties Security Properties Checked and Enforced We disabled the security findings found in A study of android application security published in SEC11 (Enck et al.) Applications should not: access to the phone data, i.e., IMEI (device identier), IMSI (subscriber identier), and ICCID (SIM serial number) send SMS to premium-rate numbers call premium-rate numbers record audio or video without the user knowing it request the list of installed applications log events create unprotected Intents register unprotected broadcast receiver Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 18 / 28

19 Outline 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Additional Examples

20 A Tour of Examples Additional Examples Blocking Advertisements Game displaying advertisements through banners Banner content is retrieved from the Web Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 19 / 28

21 A Tour of Examples Blocking Advertisements Additional Examples Ad display go through the methods in the package com.google.ads 1 a s p e c t BannerAspect { 2 // Pointcut to block Google banners 3 Object around () : execution (* com. google. ads..*(..) ) 4 &&! w i t h i n ( BannerAspect ) { 5 r e t u r n n u l l ; 6 } 7 } Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 20 / 28

22 A Tour of Examples Modifying the Device Location Additional Examples Applications display information according to the current location of the device (GPS coordinates) Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 21 / 28

23 A Tour of Examples Additional Examples Modifying the Device Location 1 a s p e c t ChangeLocationAspect { 2 // Pointcut to Android location method. 3 pointcut location ( String provider ) : call (* android. location. LocationManager. getlastknownlocation (..) ) && args ( provider ) &&! within ( ChangeLocationAspect ); 4 // Advice to change the device location 5 Location around ( String provider ) : location ( provider ) { Location location = new Location ( provider ); 8 // New latitude and longitude values in Greenland 9 location. setlatitude ( ) ; 10 location. setlongitude ( ) ; 11 r e t u r n location ; Applications: Testing Privacy Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 22 / 28

24 A Tour of Examples Additional Examples Collecting Statistics on Applications Data sent by applications: how much where? Traffic G1 G2 G3 G4 G5 G6 Sent Received a s p e c t UrlBytesAspect { 2 // Pointcut to the method that loads an URL 3 pointcut pagename ( String page ) : ( execution (* android. webkit. WebView. loadurl (..) ) 4 execution (* android. webkit. WebView. loaddatawithbaseurl (..) ) ) 5 && args (page,..) &&! w i t h i n ( UrlBytesAspect ); startrx = android. net. TrafficStats. gettotalrxbytes (); 8 // variable to count received bytes 9 starttx = android. net. TrafficStats. gettotaltxbytes (); 10 // variable to count transferred ( sent ) bytes // Advice that stores the Bytes consumed and the Url in a file 13 after ( String page ): pagename ( page ) { } Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 23 / 28

25 Outline Related Work and Discussion 1 Overview of RV-Droid 2 A Tour of Examples 3 Related Work and Discussion 4 Summary and Perspectives Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 24 / 28

26 Related Work and Discussion Static Validation Techniques Mostly relying on analyzing the permissions Stonaway Checks the principle of least privileges Compares: the requested permission (requested at installation time) vs the needed permissions (used at runtime) ComDroid Analysis of inter-application communication Prevent disclosure of information through intents (i.e., messages) Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 25 / 28

27 Related Work and Discussion Dynamic Validation Techniques TaintDroid (2010) Information-flow monitoring Tainting information in logs Bauer et al.: closest approach Monitoring LTL formula over permissions by progression 2 variants: modify two files on the device (observation of high-level events) propose to add a kernel module (observation of high and low level events) Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 26 / 28

28 Related Work and Discussion Comparison and Discussion RV-Droid in comparison General and generic method (limited by the API) Devices are taken off-the-shelf (no modification needed) Applications are taken off-the-shelf Based on state-of-the-art RV tools: expressiveness efficiency Allows Runtime Enforcement Opens several academic and industrial perspectives Current limitations RV of heavy applications has prohibitive overhead Observation using aspects has some limitations Falcone, Currea, Jaber (LIG - UJF) RV-Droid RV 2012, Istanbul, Turkey 27 / 28

29 Summary and Perspectives Summary Modification of Android applications using aspect-oriented technology Applications are taken off-the-shelf (simple yet powerful) Devices are taken off-the-shelf (no void guarantee) Generic aspects: work with any Android device/application Perspectives Dynamic validation techniques for reliability and security Trust and reliability (manufacturers, service providers, Google) Better integration with existing RV tools

Android Architecture. Alexandra Harrison & Jake Saxton

Android Architecture. Alexandra Harrison & Jake Saxton Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003

More information

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system - 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development

More information

An Android-based Instant Message Application

An Android-based Instant Message Application An Android-based Instant Message Application Qi Lai, Mao Zheng and Tom Gendreau Department of Computer Science University of Wisconsin - La Crosse La Crosse, WI 54601 [email protected] Abstract One of the

More information

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight

More information

Performance Measuring in Smartphones Using MOSES Algorithm

Performance Measuring in Smartphones Using MOSES Algorithm Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing

More information

Introduction to Android

Introduction to Android Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application

More information

DYNAMIC GOOGLE REMOTE DATA COLLECTION

DYNAMIC GOOGLE REMOTE DATA COLLECTION DYNAMIC GOOGLE REMOTE DATA COLLECTION ABSTRACT: Google defends phone data collection. Google defended the way it collects location data from Android phones. The companies' smart phones regularly transmit

More information

Runtime Verification for Real-Time Automotive Embedded Software

Runtime Verification for Real-Time Automotive Embedded Software Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime

More information

Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm

Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone

More information

Mobile Application Development Android

Mobile Application Development Android Mobile Application Development Android MTAT.03.262 Satish Srirama [email protected] Goal Give you an idea of how to start developing Android applications Introduce major Android application concepts

More information

Introduction to Android

Introduction to Android Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

An Introduction to Android Application Development. Serdar Akın, Haluk Tüfekçi

An Introduction to Android Application Development. Serdar Akın, Haluk Tüfekçi An Introduction to Android Application Serdar Akın, Haluk Tüfekçi ARDIC ARGE http://www.ardictech.com April 2011 Environment Programming Languages Java (Officially supported) C (Android NDK Needed) C++

More information

Development. SriSeshaa Technologies. Table of Contents

Development. SriSeshaa Technologies. Table of Contents SriSeshaa Technologies Development Table of Contents SriSeshaa Android Development... 2 Introduction to Android... 3 SriSeshaa Capabilities... 3 SriSeshaa Android Case Studies... 5 Privacy Guard... 5 Backup

More information

Evading Android Emulator

Evading Android Emulator Evading Android Emulator Thanasis Petsas [email protected] [email protected] - www.syssec-project.eu 1 What is a Virtual Machine? A software based computer that functions like a physical machine A

More information

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Reminders. Lab opens from today. Many students want to use the extra I/O pins on Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students

More information

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6 Contest 12 Task Pick any three mnemonics from http://www.qualityperspectives.ca/resources_mnemonics.html and find at least three bugs for each mnemonic. Feel free to use any application (website/desktop/mobile)

More information

RoverPal - A Mobile Payment Application

RoverPal - A Mobile Payment Application White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run

More information

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile

More information

Hacking your Droid ADITYA GUPTA

Hacking your Droid ADITYA GUPTA Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

A Study of Android Application Security

A Study of Android Application Security A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri USENIX Security Symposium August 2011 Systems and Internet Infrastructure Security Laboratory

More information

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015 DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP

More information

ITG Software Engineering

ITG Software Engineering Basic Android Development Course ID: Page 1 Last Updated 12/15/2014 Basic Android Development ITG Software Engineering Course Overview: This 5 day course gives students the fundamental basics of Android

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

A Characterization of Malicious Android Applications

A Characterization of Malicious Android Applications A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu June 2011

More information

Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate

Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate Future of Mobile App Security Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate Do You Know What Your Apps Are Doing? Spying Microphone & camera surveillance $

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Workshop on Android and Applications Development

Workshop on Android and Applications Development Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,

More information

Getting Started with Android Development

Getting Started with Android Development Getting Started with Android Development By Steven Castellucci (v1.1, January 2015) You don't always need to be in the PRISM lab to work on your 4443 assignments. Working on your own computer is convenient

More information

www.planetcellinc.com

www.planetcellinc.com CONFIDENTIALITY NOTICE: This presentation, and any documents, files or previous e-mail messages attached to it may contain information that is proprietary, confidential, legally privileged or protected

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Module Title: Software Development A: Mobile Application Development

Module Title: Software Development A: Mobile Application Development Module Title: Software Development A: Mobile Application Development Module Code: SDA SDA prerequisites: CT1, HS1, MS001, CA Award of BSc. In Information Technology The Bachelor of Science in Information

More information

Android Application Development

Android Application Development Android Application Development 3TECHSOFT INNOVATION*INTELLIGENCE*INFORMATION Effective from: JUNE 2013 Noida Office: A-385, Noida (UP)- 201301 Contact us: Email: [email protected] Website: www.3techsoft.com

More information

Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015

Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015 Lynn Margaret Batten IT Security Research Services & Deakin University, Melbourne, Australia June 2015 Smart devices versus PCs WebView versus Web 2.0 Tracking Certificates Mallory Countermeasures. On

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names

More information

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012 Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android

More information

Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0

Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0 Oracle FLEXCUBE Direct Banking Android Tab Client Installation Guide Release 12.0.3.0.0 Part No. E52543-01 April 2014 Oracle Financial Services Software Limited Oracle Park Off Western Express Highway

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

<Insert Picture Here> Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Programming with Android: System Architecture. Dipartimento di Scienze dell Informazione Università di Bologna

Programming with Android: System Architecture. Dipartimento di Scienze dell Informazione Università di Bologna Programming with Android: System Architecture Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Android Architecture: An Overview Android Dalvik Java

More information

Running a Program on an AVD

Running a Program on an AVD Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run

More information

An Introduction to Android

An Introduction to Android An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a

More information

TUTORIALS AND QUIZ ANDROID APPLICATION SANDEEP REDDY PAKKER. B. Tech in Aurora's Engineering College, 2013 A REPORT

TUTORIALS AND QUIZ ANDROID APPLICATION SANDEEP REDDY PAKKER. B. Tech in Aurora's Engineering College, 2013 A REPORT TUTORIALS AND QUIZ ANDROID APPLICATION by SANDEEP REDDY PAKKER B. Tech in Aurora's Engineering College, 2013 A REPORT submitted in partial fulfillment of the requirements for the degree MASTER OF SCIENCE

More information

ANDROID INTRODUCTION TO ANDROID

ANDROID INTRODUCTION TO ANDROID ANDROID JAVA FUNDAMENTALS FOR ANDROID Introduction History Java Virtual Machine(JVM) JDK(Java Development Kit) JRE(Java Runtime Environment) Classes & Packages Java Basics Data Types Variables, Keywords,

More information

Citrix Worx App SDK Overview

Citrix Worx App SDK Overview Citrix Worx App SDK Overview Table of Contents Introduction... 3 About the App Catalog Deployment Model... 3 About the Citrix MDX Toolkit... 4 The Worx App SDK... 5 The Unmanaged and Managed Modes of Worx

More information

TrustDefender Mobile Technical Brief

TrustDefender Mobile Technical Brief TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.

More information

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014 DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL

More information

Google Analytics Playbook. Version 0.92

Google Analytics Playbook. Version 0.92 Version 0.92 2014 CrownPeak Technology, Inc. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording,

More information

EZ RMC Remote HMI App Application Guide for Android Devices

EZ RMC Remote HMI App Application Guide for Android Devices EZ RMC Remote HMI App Application Guide for Android Devices The EZ RMC Remote HMI App is an application designed for your Android devices to enable the monitoring and control of your EZTouch HMIs from

More information

How to Run Your Existing Android APK on the Tizen Platform. Chandra Bajpai Matt O Keefe OpenMobile World Wide www.openmobileww.com

How to Run Your Existing Android APK on the Tizen Platform. Chandra Bajpai Matt O Keefe OpenMobile World Wide www.openmobileww.com How to Run Your Existing Android APK on the Tizen Platform Chandra Bajpai Matt O Keefe OpenMobile World Wide www.openmobileww.com OpenMobile Speakers Chandra Bajpai Vice President of New Technologies Matthew

More information

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on

More information

Android Programming and Security

Android Programming and Security Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System

More information

DataSocket Simplifies Live Data Transfer for LabVIEW

DataSocket Simplifies Live Data Transfer for LabVIEW DataSocket Simplifies Live Data Transfer for LabVIEW Many typical instrumentation solutions involve a single local application for acquisition, logging, analysis, and presentation. However, because of

More information

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information

More information

QUIRE: : Lightweight Provenance for Smart Phone Operating Systems

QUIRE: : Lightweight Provenance for Smart Phone Operating Systems QUIRE: : Lightweight Provenance for Smart Phone Operating Systems Dan S. Wallach Rice University Joint work with Mike Dietz, Yuliy Pisetsky, Shashi Shekhar, and Anhei Shu Android's security is awesome

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Resco CRM Guide. Get to know Resco CRM

Resco CRM Guide. Get to know Resco CRM Resco CRM Guide Get to know Resco CRM Table of Contents Introducing Resco CRM... 3 1.1. What is Resco CRM...3 1.2. Capabilities of Resco CRM... 4 1.3. Who should use Resco CRM...5 1.4. What are the main

More information

Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday

Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),

More information

Introduction to Android SDK Jordi Linares

Introduction to Android SDK Jordi Linares Introduction to Android SDK Introduction to Android SDK http://www.android.com Introduction to Android SDK Google -> OHA (Open Handset Alliance) The first truly open and comprehensive platform for mobile

More information

Application Compatibility Best Practices for Remote Desktop Services

Application Compatibility Best Practices for Remote Desktop Services Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to

More information

Android (Basic + Advance) Application Development

Android (Basic + Advance) Application Development Android (Basic + Advance) Application Development You will learn how to create custom widgets, create animations, work with camera, use sensors, create and use advanced content providers and much more.

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

AndroLIFT: A Tool for Android Application Life Cycles

AndroLIFT: A Tool for Android Application Life Cycles AndroLIFT: A Tool for Android Application Life Cycles Dominik Franke, Tobias Royé, and Stefan Kowalewski Embedded Software Laboratory Ahornstraße 55, 52074 Aachen, Germany { franke, roye, kowalewski}@embedded.rwth-aachen.de

More information

Overview. The Android operating system is like a cake consisting of various layers.

Overview. The Android operating system is like a cake consisting of various layers. The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and

More information

THEODORA TITONIS VERACODE Vice President Mobile

THEODORA TITONIS VERACODE Vice President Mobile THEODORA TITONIS VERACODE Vice President Mobile MOBILE SECURITY Increasing Threat MOBILE RISK 64% 34% 47% Companies with no BYOD policy. 3 Companies with no app security program. 4 614% Nearly half of

More information

The Android Developers Guide to 3 rd -Party SDK Assessment and Security

The Android Developers Guide to 3 rd -Party SDK Assessment and Security SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed

More information

Synthesis for Developing Apps on Mobile Platforms

Synthesis for Developing Apps on Mobile Platforms Synthesis for Developing Apps on Mobile Platforms Jeff Foster University of Maryland, College Park Armando Solar-Lezama Massachusetts Institute of Technology Schedule for session Jeff Foster and Armando

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS

More information

Information Rights Management in SharePoint. by André Vala

Information Rights Management in SharePoint. by André Vala Information Rights Management in SharePoint by André Vala About Me... André Vala SharePoint Solutions Architect Office & SharePoint Solutions Team Leader [email protected] @atomicvee http://blogit.create.pt/andrevala

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Overview. About Interstitial Ads: About Banner Ads: About Offer-Wall Ads: ADAttract Account & ID

Overview. About Interstitial Ads: About Banner Ads: About Offer-Wall Ads: ADAttract Account & ID Overview About Interstitial Ads: Interstitial ads are full screen ads that cover the interface of their host app. They are generally displayed at usual transformation points in the flow of an app, such

More information

file://d:\webs\touch-base.com\htdocs\documentation\androidplatformnotes52.htm

file://d:\webs\touch-base.com\htdocs\documentation\androidplatformnotes52.htm Page 1 of 5 Deliverables Requirements Installation Uninstall Supported programs Limitations Contact Welcome to UPDD Android platform specific installation instructions and related notes for UPDD version

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15 Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android

ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android Why Android? ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android Dr Dimitris C. Dracopoulos A truly open, free development platform based on Linux and open source A component-based

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement

More information

DailyMailz may collect and process the following personal information about you:

DailyMailz may collect and process the following personal information about you: Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and

More information

QUICK INSTALLATION GUIDE ACTIVATE

QUICK INSTALLATION GUIDE ACTIVATE ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.

More information

Service Providers and WebRTC

Service Providers and WebRTC Whitepaper Service Providers and WebRTC New Product Opportunities Over- the- Top (OTT) services are those that deliver communications features to customers but are apps running on the data network rather

More information

Fahim Uddin http://fahim.cooperativecorner.com [email protected]. 1. Java SDK

Fahim Uddin http://fahim.cooperativecorner.com email@fahim.cooperativecorner.com. 1. Java SDK PREPARING YOUR MACHINES WITH NECESSARY TOOLS FOR ANDROID DEVELOPMENT SEPTEMBER, 2012 Fahim Uddin http://fahim.cooperativecorner.com [email protected] Android SDK makes use of the Java SE

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

VENDOR MANUAL. Digital Products. VENDOR MANUAL Digital Redemption

VENDOR MANUAL. Digital Products. VENDOR MANUAL Digital Redemption VENDOR MANUAL Digital Products 1 TABLE OF CONTENTS 1 TO-DO CHECKLIST..PAGE 3 2 IMAGE REQUIREMENTS..PAGE 3 3 CODE REDEMPTION REQUIREMENTS..PAGE 4-5 4 VENDOR PORTAL...PAGE 5 TRACK YOUR EARNINGS VIEW PAYMENT

More information