Framework of Analysis Technique for Abnormal Behavior in Mobile Application (FATABMA)
|
|
|
- Drusilla Marshall
- 9 years ago
- Views:
Transcription
1 Framework of Analysis Technique for Abnormal Behavior in Mobile Application (FATABMA) NAQLIYAH BT ZAINUDDIN*, MOHD.FAIZAL BIN ABDOLLAH,ROBIAH BT YUSOF,SHAHRIN BIN SAHIB Faculty of Information and Communication Technology University Technical Malaysia Malacca Karung Berkunci No Pejabat Pos Durian Tunggal, Melaka MALAYSIA Abstract: - Abnormal application behavior in mobile can produce a number of undesirable effects. An incorrect or insufficient implementation of application lifecycle, memory related issues and malicious application might cause an unexpected behavior of the application such as bad usability, not responding, crashed and even data loss. Current analysis and detection of abnormal applications behavior are still not comprehensive enough where behavior under user visible failure category such as crash, stopped unexpectedly and not responding received less attention by researchers. Furthermore, framework of analysis technique has not been developed by researcher to investigate the abnormal behavior in mobile application. Thus, this research will introduce the framework of analysis technique for abnormal behavior in mobile application. In this paper, both static and dynamic analysis techniques are described and applied to Android applications to identify causes of abnormal behavior. These allow the identification of android abnormal application behavior into behavior groups, which consists certain behavior that tends to have similar generalized activity profiles. Key-Words: Abnormal behavior, application, Android, analysis techniques 1 Introduction In today s world, mobile applications are becoming increasingly important in all aspects of our lives. No longer are phones reserved just for making calls, they now do more than the PC s of a few years ago. The open source Android operating system is a great example of the future of mobile applications. The rapid growth of smartphones has lead to a renaissance in mobile application services. Android and ios, currently the most popular smartphone platforms, each offer their own public marketplace. Detection of malwares, resources issues and others factors which causing unexpected or abnormal behavior in mobile application has been the main focus by researchers in mobile security. In the area of mobile applications, an application life cycle plays an important role. According to Lbishop (2012), Android applications must conform to the Android OS s concepts of application lifecycle. Franke et. al. (2012) also highlighted that, an incorrect or insufficient implementation of the life cycle might cause unexpected behavior of the application, leading to bad usability and even data loss. When an application crashes, it may disrupts the user experience, cause data loss, and worst of all, might even cause users to uninstall the application altogether. also will result in unexpected behavior by attempting to leak personal information, getting root privilege and abuse functions of the mobile [3]. Luo et. al. (2012) has stressed that even if applications have acquired explicit user consents, users may be unaware that the applications may execute malicious behaviors. Besides, Delac et. al. ISBN:
2 (2011) also highlighted other standard malicious attacks for PCs, like worms and Trojans is also becoming applicable to the mobile platforms. such as Geimini and DroidDream will result in unexpected behavior by attempting to leak personal information, getting root privilege and abuse functions of the smartphone as reported by Isohara et. al. (2011a). Pocatilu (2011) also has reported that the behavior of malicious applications could vary from annoying messages to very unrecoverable damages. Definitely, a compromised smartphone can inflict severe damages and caused unexpected behavior in Android application. Moreover, memory leaks also are highlighted by Joshi (2012) as one of the major issues seen on the performance side of the mobile application which causing a sluggish behavior. Peng et. al. (2008) and Park et. al. (2012) also emphasized that the memory leak phenomenon will affect the memory usage, affects the application to switch efficiency and cause the increase of memory usage and diminish overall system performance. Despite the capability of Android to handle memory allocation using garbage collection, Shahriar et. al.(2014) in his research identified that many applications currently suffer from memory leak vulnerabilities and causing applications to crash due to out of memory error while running. Above researchers highlighted the possible reasons on unexpected or abnormal behavior in an android application. Despite the outbreak of research activity in this area, Wei (2013) has highlighted that there is no framework yet that focuses on analysis and profiling the behavior of an Android application. Definitely, abnormal behavior in mobile application can produce a number of undesirable effects which might cause an unexpected behavior such as bad usability, not responding, crashed and even data loss. Majority of works done are focusing on detecting of malicious behavior due to malicious whereas less work done so far in identifying abnormal application behavior which causing application to crash, stopped unexpectedly and not responding. 2 Related Works CrowDroid is a framework introduced by Burguera et. al. (2011b). The framework is using dynamic analysis on system call (Strace) which enable the distinguishing between applications that having the same name and version but behave differently. The focus of the framework is to detect anomalously application in form of Trojan horses. CrowDroid used Strace to output the behavior patterns such as system calls of installed applications on users devices. This information is sent to a remote server where the system calls are clustered using a K-means algorithm into benign and malicious categories. CrowDroid concluded that open(), read(), access(), chmod() and chown() are the most used system calls by malware. Moreover, Shabtai et. al. (2011) introduced Andromaly another behavioral malware detection framework for android devices. Andromaly is a lightweight malware detection system using Machine Learning classification techniques to classify collected observations (system performance, user activity, memory, CPU consumption, battery exhaustion etc) as either normal or abnormal. Another work is by Bl et. al. (2010) proposed AASandbox ( Android Application Sandbox). AASandbox is using static and dynamic approach to automatically detect suspicious application. For static approach, AASandbox scans the for malicious patterns without installing it. While for dynamic approach, the analysis on the application is conducted in fully isolated environment which intervenes and logs low-level interactions. Karami et. al.( 2013) had introduced a comprehensive inspection framework. The framework allows identification of reliability flaws and to trigger malware without require source-code. The framework is using dynamic approach by collecting run-time behavior analysis and also the I/O system calls generated by the applications. Kim (2011) had introduced ModelZ for monitoring, detection, and analysis of energygreedy anomalies in mobile handsets. Using light weight approach, ModelZ will monitor, detect and analyze new or unknown threats and energy-greedy anomalies on small mobile ISBN:
3 devices, with high accuracy and efficiency. Alazab et. al.(2012) introduced DroidBox a dynamic analysis tool to classify Android applications by monitoring API calls of interest invoked by an application. The analysis includes generating two graphs (behavior graphs and treemap graphs) for sample in order to provide the basis in identifying benign or malicious categories. Thing et. al.(2011) also had used system call, logs and timestamp information in his research to detect the misbehaving applications, alert the users, and log the evidence of malicious activities with. From the discussion on analysis technique in detecting malicious application, Strace is identified as a common tool in Android research and it has been used in works on malware detection by most of the researchers. Strace used the view of Linux-kernel such as network traffic, system calls, and file system logs to detect anomalies in the Android system. Furthermore, Burguera et. al. (2011a) also emphasized that monitoring systems calls (Strace) is one of the most accurate techniques to determine the behavior of an Android application since they provide detailed low level information. In the next section, we will discuss on other analysis technique used by researchers in analyzing other type of abnormal behavior due to resources leaks and application life-cycle. The detection of resources problems in mobile application has been studied by Guo et. al. (2013), Yan (2013) and Park et. al. (2012). Guo et. al. (2013) introduced an approach using static analysis tools called Relda, which can automatically analyze an application s resource operations and locate resource leaks. The method is based on a modified Function Call Graph, which handles the features of eventdriven mobile programming by analyzing the callbacks defined in Android framework. Yan (2013) proposed a novel and comprehensive approach for systematic testing for resource leaks in Android application. The approach is based on a GUI model, but is focused specifically on coverage criteria aimed at resource leak defects. These criteria are based on neutral cycles: sequences of GUI events that should have a neutral effect and should not lead to increases in resource usage. The work on memory leakage detection is by Park et. al. (2012b) using a PCB hooking technique. The technique is using dynamic analysis by gathering memory execution information (i.e.; process ID, priority, shared library list, specific process-resource list) in run-time to detect memory leakage. In the experiment, Memory Analysis Tool (MAT) was used as a comparison with their invented tool. The only work on monitoring crashes is by Kim et. al. (2010) who presented a framework which monitors and reproduces crashes. This approach involves learning patterns from features of methods that previously crashed to classify new methods as crash-prone or crash-resistant. Investigations had shown that 30% of crashed methods in ECLIPSE and 44% from ASPECTJ threw exceptions. The remaining 70% of crashed methods are not throwable and it is less common to see developers throw runtime exceptions in their programs. Futhermore, Franke et. al. (2012) presented a tool called AndroLIFT which helps the developer to monitor the life cycle, assists in implementing it and testing life cyclerelated properties. AndroLIFT is written as an extension to the ADT, the common way of developing Android applications with the Eclipse IDE. The life cycle view of this tool allows the developer to observe and analyze the life cycle of the Android application. Besides, it allow developer to easily learn about the behavior of the application life cycle to certain triggers, like an incoming call, and with which callback methods one can react appropriately. The summary of analysis techniques used in the detecting malicious and abnormality in mobile application is depicted in Table 2.1. Table 2.1: Analysis Techniques in Detecting Abnormal Behavior in Mobile Application Works Related ModelZ Kim (2011) CrowDroid Burguera et. Category Energygreedy anomalies Criteria of Detecting Abnormal Behavior Monitor and record usage of and hardware resouces Using Strace to output the behavior patterns such as ISBN:
4 Works Related al. (2011) Andromaly Shabtai et. al (2011) AASandbox Bl et. al. (2010) Karami et. al. (2013) Isohara et. al. (2011b) Guo et. al. (2013) Yan (2013) Park et. al. (2012) Kim et. al. (2010) AndroLIFT Franke et. al. (2012) DroidBox Alazab et. al. (2012) Thing et. al. (2011) Wei (2013) Category Resource leaks Resource leaks Memory leakage Crash method Monitor apps life-cycle Profiling of Android application Criteria of Detecting Abnormal Behavior system calls Using Machine Learning Classification to classify collected observation information Intervenes and logs lowlevel interaction of an apps Collecting run-time behavior analysis and also I/O system calls generated by an apps Using log collector to record activity on kernel layer Using Function Call Graph Using GUI model to detect resource leaks defect Using PCB hooking technique to gather memory execution information Learning patterns from features of the method that previously crashed Using an extension to ADT Monitoring API calls of interest invoked by an apps Using strace to log the system call, logs and timestamps information invoked by an apps Measure and profile the apps at four layers All in all, the aforementioned frameworks and systems as stated in Table 2.1 proved valuable in protecting mobile devices in general. Most of the works are focusing on malware detection in mobile application using both dynamic and static analysis techniques. Detection technique on malicious received a lot of attention by researchers. However, there is a gap in identifying the abnormal behavior which may lead to behavior of crash, stopped unexpectedly and not responding. Therefore this research will develop a framework of analysis technique for abnormal behavior for user visible failure category which includes crash, stopped unexpectedly and not responding. From the discussion on analysis technique in detecting malicious application, Strace is identified as a common tool in Android research and it has been used in works on malware detection by most of the researchers. Strace used the view of Linux-kernel such as network traffic, system calls, and file system logs to detect anomalies in the Android system. Furthermore, Burguera et. al. (2011a) also emphasized that monitoring systems calls (Strace) is one of the most accurate techniques to determine the behavior of an Android application since they provide detailed low level information. Moreover, Franke et. al. (2012) has highlighted that logcat is identified as the main logging mechanism in mobile application. Logcat allows us to capture the system debug output and log messages from the application. Wei (2013) used a combination of the logcat and getevent tools of ADB to gather the data of the user layer for multi-layer profiling of Android application. A specific tool for memory analysis is Memory Analyzer Tool (MAT). The MAT tooling is a set of plug-ins which visualizes the references to objects based on Java heap dumps and provides tools to identify potential memory leaks in Android applications. The MAT detects leakage by analyzing heap memory of one application. MAT analyzes heap memory situation when extracting log, and shows information which turns into a cause of memory leakage defect (Park et. al., 2012). Therefore, the proposed framework of analysis technique here is adapting the techniques used by existing researchers in mobile application research. As shown in Table 2.2, this research utilized a combination of Linux trace (Strace) and Android debug facilities techniques (logcat and MAT) to profile the abnormal behavior in mobile application for user visible failure category which are crash, stopped unexpectedly and not responding. Table 2.2: Analysis Techniques for Abnormal Behavior ISBN:
5 3 Datasets and Environment Applications involved in these experiments are from various categories such as games, security, tools and some others that were randomly installed from Google Play and other sites such as from and Using APK Downloader which runs under Google Chrome, an.apk files was downloaded into laptop prior to configuration under emulator. For emulator, the logs were captured using logcat, a logging application in Android platform tools. The analysis also includes logs gathered from other researcher who also conducted some experiment on Android platform. Total logs size are more than 3GB. However, crashed logs are found less than 10%. The focus of this analysis is on abnormal application behavior and these findings were later analyzed to construct a framework for abnormal application behavior. The configurations of the devices is shown in Table 3.1. Dataset Devices Configurations Total 1 Galaxy Tablet Samsung P Android Emulator (API Level 10) Android Emulator (API Level 10) 3 Android Emulator 2.2 (API Level 8) Apps. Total Space 11GB 120 RAM=343, VM Heap = 32, Internal Storage=200 MiB RAM=343, VM Heap = 32, Internal Storage=200 MiB RAM=512, VM Heap = 16, Internal Storage=200 MiB No Techniques Tools/Interface Objectives 1 Logcat Analysis 2 Heap dump Analysis 3 STRACE Analysis Manual analysis on extracted stack traces Eclipse MAT (Memory Analyzer Tool) adb shell strace -p <PID_number> To understand the application level activity sequence for abnormal activity To identify the objects and classes consuming memory in the java heap To identify system calls or signals made to the OS Scenario 2-Switching between vertical/horizontal views Scenario 3- Repeatedly creating and terminating an application These similar test scenarios were also conducted by Park et. al. ( 2012b) in Android memory related experiments. On real devices, around 120 applications were installed and monitored for abnormal application behavior. The logs were collected using an application named LogCollector.apk and also using automated crashed detector application named Crash Log.apk in the event of application is crashing, not responding or unexpectedly stopped. The framework for analysis technique as shown in Figure 3.1 is proposed as this framework is needed for identifying abnormal behavior in mobile application. Table 3.1: Devices Cofigurations For simulation on the emulator, we organized three test scenarios where possible abnormal behavior such as; memory leakage can occur in applications. The scenarios are as follows. Scenario 1- Running multiple applications simultaneously ISBN:
6 Figure 3.1: Framework for Analysis Technique of Abnormal Behavior in Mobile Application (FATABMA) 4 Analysis and Results Based on framework proposed above, 3 multistep data collection and analysis are conducted as following: 4.1 Logcat Analysis For logcat analysis, we have collected around 50 stack traces for crashes and ANR applications. We analyzed the abnormal behavior manually based on keywords identified. Details analysis of the attributes gathered from the logcat are as following: a) Identification of warnings/errors thrown The result had shown that 80% of the crashes and ANR thrown an unhandled exception due to java.lang. The unhandled exceptions thrown include illegalargumentexception, illegalstateexception, nullpointerexception, outofmemory and other exceptions. Memory related problems can be identified from the extracted stack traces such as java.lang.outofmemoryerror, buffer overflow and Out of memory. b) Identification of GC activity patterns There are 5 types of GC can be found in logcat. GC_CONCURRENT is triggered when a heap is growing by reclaiming memory in time so that the heap does not need to be enlarged. GC_EXPLICIT is triggered when an application issuing System.gc() method. Since the virtual machine is quite capable of handling GC, this type of GC should actually never be called. GC_EXTERNAL_MALLOC is used for externally allocated memory like bitmaps and NIO direct byte buffers. This is only on pre- Honeycomb devices because from Honeycomb the external memory is allocated inside dalvik heap. GC_FOR_MALLOC is triggered when the heap is full and the application needs more memory. This will stop application to perform a GC. GC_HPROF_DUMP_HEAP is triggered when an HPROF file is created for memory analysis. GC activities in this context are an automatic and continuous process until the application abnormally terminated. GC_Concurrent and GC_For_Malloc are occurred automatically and repeatedly. GC_For_Malloc was triggered when there was not enough memory left on the heap to perform an allocation. While, GC_Concurrent was triggered when the heap has reached a certain amount of objects to collect and appeared to free <1K left memory. Therefore, this research concluded that GCForAlloc is the most frequent GC appeared in this study which is 68%. c) Identification of CPU Usage patterns We found very little logs thrown the CPU usage indicators for their applications. However, the result shows an increase in CPU usage more than 40% for ANR and crashed applications. An application is totally crashed or not responding when the log throws the messages such as service crashed, WINDOW died and WIN death. Initial analysis using logcat allows us to investigate on possibility of memory issues on application. 4.2 Heap-dump Analysis Heap dump files were later generated from crashed applications to perform the memory analysis. In this phase, we managed to capture 40 crashed applications with the heap size around 1.4MB to 4.8MB. The results show that all suspected leaks are on the same classes/objects which are; java.lang.class (leaks suspects range around 33% - 39%), java.lang.string (leaks suspects range around 17% - 19%) and org.bouncycastle.jce.provider.x509certific ateobject (leaks suspects range around 15% - 17%). Highest memory consumptions by objects/classes are found on org.apache.harmony.xnet.provider (around 186KB), class android.text (around 123KB), and org.bouncycastle.jce (around 61KB). ISBN:
7 The framework of analysis techniques for abnormal application behavior is presented here as a way to identify the reasons of abnormal activity in mobile application This work proposes a framework of analysis technique on identifying abnormal behavior patterns: (i) To understand the application level activity sequences for abnormal activity via logcat (ii) To identify the objects and classes consuming memory in the java heap (iii) To identify system calls or signals made to the OS using Strace. This research discovered common patterns by applications in category user visible failure which are; crash, stopped unexpectedly and not responding where stack trace analysis provide initial information for further investigation on possibility of memory related issues in an application. Figure 4.1: Leaks Suspected on Crashed/ANR Applications Figure 4.1 shows only some portion of applications with leaks suspected objects and classes. So far, leaks suspected and high memory consumptions are found on the same classes/object. 4.3 STRACE The result shows that the only system call made during ANR and crashed application is SIGKILL. The strace will return a message kill(<pid>, SIGKILL <unfinished...> to terminate the process immediately. In Linux, the kill command is used to terminate processes without having to log out or reboot (i.e., restart) the computer or devices. A pid is a unique process identification number belonging to each process and it is created to be used by the system for referencing to the process. This is to ensure the stability of such systems, in other words to ensure that an application is completely terminated. No other system call was found for this type of behavior. 5 Conclusions REFERENCES [1] Lbishop, ANDROID LIFECYCLE FOR APPLICATION DEVELOPERS :, no. May, [2] D. Franke and T. Roy, AndroLIFT : A Tool for Android Application Life Cycles, no. c, pp , [3] T. Isohara, K. Takemori, and A. Kubota, Kernel-based Behavior Analysis for Android Malware Detection, pp , [4] H. Luo, G. He, X. Lin, and X. (Sherman) Shen, Towards hierarchical security framework for smartphones, st IEEE Int. Conf. Commun. China, pp , Aug [5] G. Delac, M. Silic, and J. Krolo, Emerging Security Threats for Mobile Platforms, Electr. Eng., pp , [6] P. Pocatilu, Android Applications Security, Management, vol. 15, no. 3, pp , ISBN:
8 [7] M. Joshi, Analysis and Debugging of OEM s, [8] L. Peng, J.-K. Peir, T. K. Prakash, C. Staelin, Y.-K. Chen, and D. Koppelman, Memory hierarchy performance measurement of commercial dual-core desktop processors, J. Syst. Archit., vol. 54, no. 8, pp , Aug [9] J. Park and B. Choi, Automated Memory Leakage Detection in Android Based Systems, vol. 5, no. 2, pp , [10] H. Shahriar, S. North, and E. Mawangi, Testing of Memory Leak in Android Applications, 2014 IEEE 15th Int. Symp. High-Assurance Syst. Eng., pp , Jan [11] X. Wei, ProfileDroid : Multi-layer Profiling of Android Applications Categories and Subject Descriptors, [12] I. Burguera and U. Zurutuza, Crowdroid : Behavior-Based Malware Detection System for Android, System, pp , [13] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, Andromaly : a behavioral malware detection framework for android devices, J. Intell. Inf. Syst., vol. 38, no. 1, pp , Jan [14] T. Bl, L. Batyuk, A. Schmidt, S. A. Camtepe, S. Albayrak, and T. Universit, An Android Application Sandbox System for Suspicious Software Detection, Techniques, pp , [16] H. Kim, MODELZ: Monitoring, Detection, and Analysis of Energy- Greedy Anomalies in Mobile Handsets, IEEE Trans. Mob. Comput., vol. 10, no. 7, pp , Jul [17] M. Alazab, V. Monsamy, L. Batten, P. Lantz, and R. Tian, Analysis of and Benign Android Applications, nd Int. Conf. Distrib. Comput. Syst. Work., pp , Jun [18] V. L. L. Thing, P. P. Subramaniam, F. S. Tsai, and T. Chua, Mobile Phone Anomalous Behaviour Detection for Real-time Information Theft Tracking, no. c, pp. 7 11, [19] C. Guo, J. Zhang, J. Yan, Z. Zhang, and Y. Zhang, Characterizing and detecting resource leaks in Android applications, th IEEE/ACM Int. Conf. Autom. Softw. Eng., pp , Nov [20] D. Yan, Systematic Testing for Resource Leaks in Android Applications, no. Vm, pp , [21] S. Kim, N. Bettenburg, and T. Zimmermann, Predicting Method Crashes, [22] T. Isohara, K. Takemori, and A. Kubota, Kernel-based Behavior Analysis for Android Malware Detection, 2011 Seventh Int. Conf. Comput. Intell. Secur., pp , Dec [15] M. Karami, M. Elsabagh, P. Najafiborazjani, and A. Stavrou, Behavioral Analysis of Android Applications Using Automated Instrumentation, 2013 IEEE Seventh Int. Conf. Softw. Secur. Reliab. Companion, pp , Jun ISBN:
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
AndroLIFT: A Tool for Android Application Life Cycles
AndroLIFT: A Tool for Android Application Life Cycles Dominik Franke, Tobias Royé, and Stefan Kowalewski Embedded Software Laboratory Ahornstraße 55, 52074 Aachen, Germany { franke, roye, kowalewski}@embedded.rwth-aachen.de
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
HeapStats: Your Dependable Helper for Java Applications, from Development to Operation
: Technologies for Promoting Use of Open Source Software that Contribute to Reducing TCO of IT Platform HeapStats: Your Dependable Helper for Java Applications, from Development to Operation Shinji Takao,
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
A Practical Method to Diagnose Memory Leaks in Java Application Alan Yu
A Practical Method to Diagnose Memory Leaks in Java Application Alan Yu 1. Introduction The Java virtual machine s heap stores all objects created by a running Java application. Objects are created by
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
What s Cool in the SAP JVM (CON3243)
What s Cool in the SAP JVM (CON3243) Volker Simonis, SAP SE September, 2014 Public Agenda SAP JVM Supportability SAP JVM Profiler SAP JVM Debugger 2014 SAP SE. All rights reserved. Public 2 SAP JVM SAP
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN: 2349-6495
International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] Survey on Automation Testing Tools for Mobile Applications Dr.S.Gunasekaran 1, V. Bargavi 2 1 Department
ProfileDroid: Multi-layer Profiling of Android Applications. Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos
ProfileDroid: Multi-layer Profiling of Android Applications Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos How do we know what is occuring in an app? Description, connections, services? >550
Reminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
How to use IBM HeapAnalyzer to diagnose Java heap issues
IBM Software Group How to use IBM HeapAnalyzer to diagnose Java heap issues Jinwoo Hwang ([email protected]) IBM HeapAnalyzer Architect/Developer WebSphere Support Technical Exchange Introduction Java
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Mobile Application Development Android
Mobile Application Development Android MTAT.03.262 Satish Srirama [email protected] Goal Give you an idea of how to start developing Android applications Introduce major Android application concepts
Introduction to Android Development. Jeff Avery CS349, Mar 2013
Introduction to Android Development Jeff Avery CS349, Mar 2013 Overview What is Android? Android Architecture Overview Application Components Activity Lifecycle Android Developer Tools Installing Android
Tuning WebSphere Application Server ND 7.0. Royal Cyber Inc.
Tuning WebSphere Application Server ND 7.0 Royal Cyber Inc. JVM related problems Application server stops responding Server crash Hung process Out of memory condition Performance degradation Check if the
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
Understand and Build Android Programming Environment. Presented by: Che-Wei Chang
Real Time System Project 1 Understand and Build Android Programming Environment Advisor: Prof. Tei-Wei i Kuo Presented by: Che-Wei Chang Outline Introduction to Android Framework What is Android Android
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Lecture 1 Introduction to Android
These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy
Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( [email protected] )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( [email protected] ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
Instrumentation Software Profiling
Instrumentation Software Profiling Software Profiling Instrumentation of a program so that data related to runtime performance (e.g execution time, memory usage) is gathered for one or more pieces of the
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Monitoring and Managing a JVM
Monitoring and Managing a JVM Erik Brakkee & Peter van den Berkmortel Overview About Axxerion Challenges and example Troubleshooting Memory management Tooling Best practices Conclusion About Axxerion Axxerion
CS378 -Mobile Computing. Android Overview and Android Development Environment
CS378 -Mobile Computing Android Overview and Android Development Environment What is Android? A software stack for mobile devices that includes An operating system Middleware Key Applications Uses Linux
Android Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
THE BUSY DEVELOPER'S GUIDE TO JVM TROUBLESHOOTING
THE BUSY DEVELOPER'S GUIDE TO JVM TROUBLESHOOTING November 5, 2010 Rohit Kelapure HTTP://WWW.LINKEDIN.COM/IN/ROHITKELAPURE HTTP://TWITTER.COM/RKELA Agenda 2 Application Server component overview Support
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events You Joung Ham and Hyung-Woo Lee devices, and analyses the characteristics of malicious apps with activation pattern
Delivering Quality in Software Performance and Scalability Testing
Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Intel Integrated Native Developer Experience (INDE): IDE Integration for Android*
Intel Integrated Native Developer Experience (INDE): IDE Integration for Android* 1.5.8 Overview IDE Integration for Android provides productivity-oriented design, coding, and debugging tools for applications
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
SoMA. Automated testing system of camera algorithms. Sofica Ltd
SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Monitoring, Tracing, Debugging (Under Construction)
Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.
An Introduction to Android. Huang Xuguang Database Lab. Inha University 2009.11.2 Email: [email protected]
An Introduction to Android Huang Xuguang Database Lab. Inha University 2009.11.2 Email: [email protected] Outline Background What is Android? Development for Android Background Internet users and Mobile
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Mobile Performance Management Tools Prasanna Gawade, Infosys April 2014
Mobile Performance Management Tools Prasanna Gawade, Infosys April 2014 Computer Measurement Group, India 1 Contents Introduction Mobile Performance Optimization Developer Tools Purpose and Overview Mobile
060010702 Mobile Application Development 2014
Que 1: Short question answer. Unit 1: Introduction to Android and Development tools 1. What kind of tool is used to simulate Android application? 2. Can we use C++ language for Android application development?
l What is Android? l Getting Started l The Emulator l Hello World l ADB l Text to Speech l Other APIs (camera, bitmap, etc)
today l What is Android? l Getting Started l The Emulator l Hello World l ADB l Text to Speech l Other APIs (camera, bitmap, etc) l Other: Signing Apps, SVN l Discussion and Questions introduction to android
Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Practical Performance Understanding the Performance of Your Application
Neil Masson IBM Java Service Technical Lead 25 th September 2012 Practical Performance Understanding the Performance of Your Application 1 WebSphere User Group: Practical Performance Understand the Performance
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Android v ios Mobile Operating Systems
v ios Mobile Operating Systems is an open source operating system widely used on smartphones and tablets. has been available under a free and open source software license from October 21, 2008 and until
Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Smartphone market share
Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C6 Operating System Concepts Module Curriculum Module Description: This module examines the fundamental components of single computer
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Introduction to Android Programming (CS5248 Fall 2015)
Introduction to Android Programming (CS5248 Fall 2015) Aditya Kulkarni ([email protected]) August 26, 2015 *Based on slides from Paresh Mayami (Google Inc.) Contents Introduction Android
Image Area. White Paper. Best Practices in Mobile Application Testing. - Mohan Kumar, Manish Chauhan. www.infosys.com
Image Area White Paper Best Practices in Mobile Application Testing - Mohan Kumar, Manish Chauhan www.infosys.com Contents Introduction 3 QA Challenges in Mobile Application Testing 3 Device Variation
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Introduction to Android
Introduction to Android Android Smartphone Programming Matthias Keil Institute for Computer Science Faculty of Engineering October 19, 2015 Outline 1 What is Android? 2 Development on Android 3 Applications:
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Enhanced Diagnostics Improve Performance, Configurability, and Usability
Application Note Enhanced Diagnostics Improve Performance, Configurability, and Usability Improved Capabilities Available for Dialogic System Release Software Application Note Enhanced Diagnostics Improve
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
What else can you do with Android? Inside Android. Chris Simmonds. Embedded Linux Conference Europe 2010. Copyright 2010, 2net Limited.
What else can you do with Android? Chris Simmonds Embedded Linux Conference Europe 2010 Copyright 2010, 2net Limited 1 Overview Some background on Android Quick start Getting the SDK Running and emulated
Application of Android OS as Real-time Control Platform**
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 2 http://dx.doi.org/10.7494/automat.2013.17.2.197 Krzysztof Ko³ek* Application of Android OS as Real-time Control Platform** 1. Introduction An android operating
Practical Attacks against Mobile Device Management Solutions
Practical Attacks against Mobile Device Management Solutions Michael Shaulov, CEO [email protected] Daniel Brodie, Sr Security Researcher [email protected] About: Daniel Security researcher for nearly
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
XenMobile Logs Collection Guide
XenMobile Logs Collection Guide 1 Contents Summary... 3 Background... 3 How to Collect Logs from Server Components... 4 Support Bundle Contents... 4 Operations Supported for Server Components... 5 Configurations
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
Stratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I)
ANDROID APPS DEVELOPMENT FOR MOBILE AND TABLET DEVICE (LEVEL I) Who am I? Lo Chi Wing, Peter Lecture 1: Introduction to Android Development Email: [email protected] Facebook: http://www.facebook.com/peterlo111
Java Troubleshooting and Performance
Java Troubleshooting and Performance Margus Pala Java Fundamentals 08.12.2014 Agenda Debugger Thread dumps Memory dumps Crash dumps Tools/profilers Rules of (performance) optimization 1. Don't optimize
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
