Dependability Issues of Android Games: A First Look via Software Analysis
|
|
|
- Silvester Oliver
- 9 years ago
- Views:
Transcription
1 Dependability Issues of Android Games: A First Look via Software Analysis Jiaojiao Fu Yangfan Zhou Yu Kang School of Computer Science, Fudan University Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute, The Chinese University of Hong Kong Dept. of Computer Science & Engineering, The Chinese University of Hong Kong [email protected], {yfzhou, ykang}@cse.cuhk.edu.hk Abstract Smartphones have surged into popularity in recent years, which has dramatically changed the way people live, work, and have fun. Smartphone games are an important type of Smartphone applications, which attract many software developers. However, they still have not caught much research attention in the software dependability community. In this paper, we study the characteristics of over 2000 Android games with software analysis techniques, with a focus on their dependability issues. Our study suggests that a new security paradigm is of great importance to Smartphone games to prevent potential privilege abuse. Moreover, a new set of testing and debugging approaches should be specifically tailored for Smartphone games, since games are becoming more complicated. Our study also reveals that most games are not specifically optimized according to the user pattern of Smartphones. We expect these open problems can bring more attentions to the software dependability community. I. INTRODUCTION Recent years have witnessed the dramatic popularity of Smartphones, which have changed the way users live, work and have fun. Android is a prevalent open operating system for Smartphones [1], which recently becomes the most popular mobile operating system, sharing 79.3% of market shipments [2]. Among over 1 million applications (app in short) currently available in Google Play, the official Android app market, games form a typical type of apps which share over 5 [3]. Furthermore, according to Mobile Games Forum[4], games occupied the largest download times and more than 13 million users in EU (European Union) played games every day in 2012 [5]. The popularity of Smartphone games is even increasing in 2013 [6]. Although Smartphone games have quickly surged into popularity, there is still little research in the dependability community that focuses on this specific type of apps. This paper aims at providing the first look at the characteristics and new challenges introduced by Smartphone games in software dependability issues. To this end, we investigated over 2000 Android games with both static analysis approaches and dynamic ones. Our study reveals several important properties of the Smartphone games ecosystem that should bring attentions to the software dependability community. We highlight them in what follows. 1) A new security paradigm is of great importance to Smartphone games to prevent potential privilege abuse. We found that over half of the target games contain embedded advertisement modules (ads in short). Games typically request many privileged permissions for its ads such as accessing the Internet and the user location. These permissions can potentially cause privacy leak. A game with many privileged permissions is dangerous if being compromised. Hence, a new security paradigm should be designed for Smartphone games, for example, that can separate the ads which demand more privileged permissions from the native game codes with less privilege requirements. 2) Smartphone games are becoming more complicated, which pose great challenges to traditional testing and debugging approaches, especially for popular games that represent the trend of future mobile games. We found that 1) popular games tend to be larger in size, most of which (45% of the top 100 games) even require to install large separated data files in the extended storage (SD card typically) unlike typical Android apps that just install a stand-alone.apk file, 2) they generally require more privileged permissions and contain more embedded ads, and 3) they usually (84.4% of them) rely on a mixture of native C codes and Java codes to implement their functionality, unlike typical Android apps which are coded with Java only. Unfortunately, current testing and debugging methods generally cannot deal with such complications. Hence, a new set of testing and debugging approaches should be specifically tailored for Smartphone games. 3) Most games are not specifically optimized according to the user patterns of Smartphones. For example, when the games are just hanging in the background (typically due to the user pressing the Home button or just picking up a call), nearly half of them are still active in generating network traffic. This should generally be avoided: Most of the cases the game should be frozen since the user is not playing it. Continuous network transmissions may deteriorate device performance, drain battery power, and cause unnecessary resource usage (e.g., 3G bandwidth). Game developers should be aware of the specific user patterns of Smartphones and optimize their apps accordingly. The rest of the paper is organized as follows. Section II
2 presents our experimental settings. In section III, we elaborate how we conduct our empirical analysis, what kinds of features we extract from each of the games, and how we obtain the feature data. We analyze the results obtained and provide implications on dependability issues of mobile games. The related work is discussed in Section IV. The paper is finally concluded in Section V. Percentage of games % II. EXPERIMENTAL SETUP 6.06% 9.69% To study tremendous games currently available in Google Play, we resort to a sampling approach: We randomly download 1600 apps from an app market which are labeled as games. We consider these 1600 games can well reflect the characteristics of all available games in the market. We call these games the randomly-sampled games in our following discussions. The popularity of a game well represents how people embrace it, which will consequently influence the Smartphone game industry. In other words, popular games can indicate the future direction of game design. In this regard, we also download the top 800 games according to their popularity, i.e., the statistic of current installations. We call these games the popular games in our following discussions. >10 [8,10] [5,7] 4 Number of Permission Required (a) Randomly-sampled games Percentage of games % 21.77% 21.51% Each of the games is downloaded in Android application package file (APK) format. An APK file of an app contains all codes of the app, resources, assets, certificates, and a manifest file (i.e., a configuration file) named AndroidManifest.xml. We design a toolset, namely Gamalysis, to analyze the APK files. Gamalysis is an open-source java program, which contains several thousand lines of codes. The codes and our data set are available online at Gamalysis. Gamalysis analyzes Smartphone games based on both static analysis and dynamic analysis. To conduct static analysis, Gamalysis first employs apktool, a tool for APK file decompilation and packaging [7]. It can then obtain the encapsulated contents of an APK file, e.g., the bytecodes of the game for Dalvik virtual machine (where an Android app is running), and the manifest file AndroidManifest.xml. By parsing the bytecodes and the manifest file, Gamalysis can obtain a set of static features of a game. To conduct dynamic analysis, we use a real device (SAM- SUNG S7562i). The device is connected to a computer using USB cable. Gamalysis relies on ADB (Android Debug Bridge) [8] to control the device. A target game can thus be installed, executed, and monitored (via an app we implement on Android) by Gamalysis without human intervention. III. EMPIRICAL ANALYSIS: METHODS AND RESULTS Now we discuss how Gamalysis extracts the features of a game app in terms of their permission requests, ads included, NDK usage, and Internet traffic, and provide the results of our empirical analysis, respectively in what follows. A. Privileges to access system-protected resources Designed as a privilege-separated operating system (OS), Android executes each app with a distinct system identity, Fig [8,10] [5,7] 4 Number of Permission Required (b) Popular games Distribution of permission numbers which can isolate apps from each other and from the OS. Thus, each app can have its own privilege to access the system resources, which is provided through a permission mechanism. With a particular permission, an app can access the resource associates with the permission. Each app can claim its required permissions in the Android- Manifest.xml file deployed with the app. When a user installs an app, she must accept all the permissions specified in the file. In other words, through analyzing the permission requirements in AndroidManifest.xml, we can know the privilege level of a game app. The permission requirements of a game reflect an important security feature of the game, which is hence of our interest for dependability analysis. Each permission requirement is declared by a usespermission android tag in AndroidManifest.xml. Therefore, Gamalysis employs apktool, a tool for APK file decompilation and packaging to extract the AndroidManifest.xml file of each target app, where the uses-permission android tags are analyzed and the permission requirements are thus obtained. Figure 1 shows the distributions of the permission numbers that the target apps request. We can find from Figure 1 it is quite common that a large portions of the target games requests many permissions. Nearly of the randomlysampled games request over 5 permissions. The situation is even much more significant for popular games: 78.5% of the popular games request over 5 permissions, among which one even requests 37 permissions.
3 Fig Distribution of permission usage Figure 2 further shows how the 130 Android-defined permissions distribute among the target randomly-sampled games. We can see that only a few (ten in our experimental study) of the 130 permissions are frequently used by most applications and others are seldom used. Figure 3 plots the detailed statistics of these 10 commonly used permissions for randomly-sampled games and popular games. We can see that INTERNET (i.e., the permission to access the Internet) is the most frequently-used permission, which 88.4% of the randomly-sampled games require. 21.8% of the randomly-sampled games will obtain the user location. For popular games, the percentages are even larger. 97.8% of the popular games require the permission to access the Internet and 29% of them request to access the user location. Among these 10 permissions, there are 5 of them that can potentially allow a game to leak private user information or perform other malicious actions, which are listed in Figure 4. In general, an app with many privileged permissions is dangerous if being compromised. In this regard, the game which typically requires so many permissions is a potential security threat to Smartphones. A further investigation of why so many privileged permissions are required, and how to avoid a game to require so many privileged permissions in its design is of critical importance. Moreover, it is also interesting to examine whether a new runtime security paradigm is possible for Smartphone games to prevent permission abuse. B. Advertisement modules More than 73% of apps in Google Play are free. Apps usually contain third-party commercial advertisement modules (ads in short), which is a common way for app developers to gain revenue. To include third-party ads, developers have to bundle ad libraries from the ad service providers into their apps. Ads and game per se are providing different software functionality in nature, but they are packaged together and executed in the same process. Ads can inevitably influence the dependability of games. For example, Pathak et al. [9] found that ads spend 65%-75% of energy in free apps, which can deteriorate power efficiency. It is therefore important to study the ads in games. Fig. 3. f gam mes Percenta age o f gam mes Percenta age o Top ten permissions (a) Randomly-sampled games (b) Popular games INTERNET Access the Internet READ_PHONE_STATE: Access sensitive phone information such as phone number and identity (IMEI) WRITE_EXTERNAL_STORAGE Write to external storage ACCESS_COARSE_LOCATION Obtain coarse user location ACCESS_FINE_LOCATION Obtain fine user location Fig. 4. Example sensitive permissions Ad library information is typically presented by app developer in AndroidManifest.xml. Figure 5 shows an example, where com.google.ads.adactivity is the ad library and AD- MOD PUBLISHER ID is the app identifier for the ad library. Without specific information of an ad, we cannot know whether an app has included that ad. There are tremendous ad service providers, making it infeasible to identify each of them. Luckily, most apps with ads contain the most popular ads. For example, 99.7% of apps with ads contain the top 10 frequently used ad libraries [10]. Hence, we choose 13 popular ad libraries on Android platform and generated rules for identifying these libraries used by the apps, and disregard the rest of the ads, since they are rarely included. Figure 6 presents the statistics of how many ads among the target 13 ads are included in games. We can see that over half of the games contain ads. Many games even contain more than 5 of the 13 most popular ad service providers. Popular games typically have more ads in one app than regular-sampled games.
4 <activity android:name= com.google.ads.adactivity android:configchanges= keyboard keyboardhidden orientation screenlayout uimode screensize smallestscreensize /> <activity android:name= com.facebook.loginactivity /> <meta-data android:name= ADMOD_PUBLISHER_ID android:value= a cld2c5a"/> <meta-data android:name= com.facebook.sdk.applicationid /> Fig. 5. An example segment of AndroidManifest.xml with ad library information Packaged together with ads, a game will execute in the same process with the ads. Therefore, a game will have to inherit the permissions required by the ads, and request them during the installation of the game. Figure 7 provides the permissions required by each of the 13 ads, where the first column shows the names of the ads. We can find that most ads need to perform privileged actions, e.g., accessing the Internet and accessing sensitive phone information and locations. Hence, typically games have to request many privileged permissions for its ads, which can cause potential security problems, e.g., privacy leak. New security paradigms can be helpful to enhance the security of Smartphone apps. For example, a paradigm which can separate the ads which demand more privileged permissions from the native game codes with less privilege requirements will help prevent potential privilege escalation by malicious codes. C. Background Internet traffic More and more Smartphone apps rely on the Internet access to obtain remote data and provide richer functionalities. Game is not an exceptional case, as we have demonstrated that games typically requires the INTERNET permission. However, the Internet access is not free. The interface devices (e.g., the WIFI transmission chip) can consume battery energy. Moreover, network bandwidth is limited resource shared by active apps. Unnecessary bandwidth consumption can drain battery power and deteriorate app performance, causing dependability problems. Therefore, we also study the Internet access of games. We employ a prevalent Internet packet capturing tool called tcpdump [11] to obtain the Internet access information of a target game. Since it is infeasible to play all our target games (over 2000 games in total) and analyze one by one the Internet access information, we resort to an automatic approach as follows. We implement an Android app, which can capture the Internet access of a target game by invoking tcpdump. The app is installed in our target device and run as a service in the background. Gamalysis will automatically install a target game in the device, and then execute the game. The app will capture the game s Internet access information for one minute during which there is no human intervention. Gamalysis then simulates the scenario that the Home button is pressed by the user. This is a typical user pattern when the user wants to stop playing the game. It will generally cause the game app to run in the background. The app will also capture the Internet access information for 2 minutes. Finally, the game is terminated. Our experimental results show that a game will typicall cause two kinds of the Internet traffic. One is for connecting Fig. 6. ames Perce entage e of g ntage e of ga ames Perce % 3.63% [4,3] [2,1] 0 Number of ads included (a) Randomly-sampled games 1.36% [4,3] [2,1] 0 Number of ads included (b) Popular games Distribution of the number of ads a game server (e.g, that hosted in Amazon EC2 cloud) and the other for communicating with ad servers. One important phenomenon is that there are 48.87% among all target games that will still generate network traffic when they are running in the background. Actually, most of the cases the game app is frozen since the user is not playing it. Internet traffic should meanwhile be avoided. Unnecessary network traffic may deteriorate device performance, drain battery power, and cause unnecessary resource usage (e.g., 3G bandwidth). When running in the background, active app behaviors (e.g., communicating a remote server) are generally caused by app-defined Android service [1]. Game developers should be aware of the specific user patterns of Smartphones and accordingly optimize their apps, e.g., freeze its unnecessary background services. D. Popular games: The trend of Smartphone games The popularity of a game reflects how people accept the game, which can also influence the game industry. In this regard, popular games can well represent the trend of future mobile games. Next, we discuss the features of popular game, comparing with the randomly-sampled games. 1) Size: First, popular games tends to be larger in size. Most popular games (45% of the top 100 in all target popular
5 Fig. 7. Permissions required by popular ads. and indicate the permission is a compulsory one and an optional one, respectively. games and 30.9% of all) even require to install large separated data files in the extended storage (SD card typically) unlike typical Android apps that just install a stand-alone APK file. The reason is that the size of most popular games is huge. If being installed as a stand-alone APK file, all the contents will occupied the internal storage of a Smartphone. Hence, a game is divided into two parts, a relatively small.apk file and a set of large data files saved in the extended storage. 2) Permissions and ads: Second, popular games require more permissions and include more ads than randomlysampled games do. As discussed in Section III-A, over 22% of the popular games request over 10 permissions, while only 6% of the randomly-sampled games request over 10 permissions. Figure 6 further shows that popular games generally include more ads. 3) Native Development Kit (NDK) usage: Android app is implemented with Java language, since Android provides a rich set of API libraries in Android Java SDK (Software Development Kit). In order to support C/C++ development, NDK (Native Development Kit) toolset is also provided, with which developers can implement part of app functionality in C/C++ in dynamic libraries, which can be automatically packed with Java codes into the same APK file [1]. It is commonly known that NDK is rarely used in general apps: Less than 1 of the apps used NDK [9]. In this regard, much research work on dependability focuses on approaches tailored only for apps implemented only with Java. The population of games that use NDK is an important consideration to tools for dependability enhancement. Hence, in this work, we investigate the popularity of NDK usage in games. We determine whether a target game uses NDK by examining whether dynamic libraries implemented with C/C++ (i.e.,.so files in general) have been packaged in its corresponding APK file. Our findings show that games usually rely on a mixture of native C codes and Java codes to implement their functionality, unlike typical Android apps which are coded with Java only. Popular games rely more heavily on NDK development (84.4%) than random-sampled games (5.8%). 4) A summary: We have shown that the trend of mobile games is that they are becoming larger and more complicated, which will involve more prelimited permissions and rely more heavily on a mixture of native C codes and Java codes to implement their functionality. Unfortunately, current testing and debugging methods generally cannot deal with such complications. Hence, a new set of testing and debugging approaches should be specifically tailored for Smartphone games. IV. RELATED WORK The popularity of Smartphones has attracted a large amount of research efforts. We survey the related work in this section. Closely-related to this paper is the work that studies how to profile and analyze Smartphone apps. Wei et al. [12] profiled 27 apps from four layers: app specification, user interaction, operating system and network. Cho et al. [13] implemented a cross layer tool AndroScope, which is a performance tool for both Android platform and applications. Qian [14] designed ARO, the tool to expose the cross-layer interaction among various layers to discovery the inefficient resource usage for Smartphone apps. Specifically in Internet traffic analysis, Tongaonkar et al. [10] employed statistical analysis method to study the Internet usage behaviors of apps based on ad flows. Dai et al. [15] generated representative network traces and analyzed the network profiles of apps.
6 There are also many works studying the energy efficiency of Smartphones. Mittal et al. [16] presented an energy emulation tool empowering developers to estimate the Android apps energy consumption. edoctor [17] is a practical tool that helps regular users to identify abnormal battery drain issues on Smartphones. Pathak et al. [9][18][19] and Jindal et al. [20] studied where the energy is used in an app and provide power models of different granularities to identify the energy bugs of Smartphones. Besides, recent research has also focused on the specific applications. For example, Xu et al. [21] optimized sync mechanism to decrease power consumption. LiKamWa [22] provided two mechanisms for improving energy efficiency of image sensing towards continues mobile vision. However, to our best knowledge, although games occupied almost half of the popular apps in software market like Google Play, there is no work focusing on Smartphone games anaysis. V. CONCLUSION This paper provides a first look at the characteristics of Smartphone games with a focus on their dependability issues on the Android OS. We study over 2000 games available in an Android app market. An analysis tool, namely, Gamalysis is developed, which can extract the features of a game app in terms of their permission requests, ads included, NDK usage, and Internet traffic. We conduct a statistical study on the data, and find out several dependability issues. The study suggests a call for research on a new toolkit for testing, debugging, securing, and optimizing Android games according to their specifics. We expect these open problems can bring more attentions to the software dependability community. Future work of interest includes how to profile and analyze the energy efficiency of Android games, i.e., the battery usage features of Android games. ACKNOWLEDGEMENT This work was supported by the National Basic Research Program of China under 973 Project No. 2011CB302603, the National Natural Science Foundation of China under Project Nos and , and the Shenzhen Basic Research Program under Project No. JCYJ Yangfan Zhou is the corresponding author. REFERENCES [1] M. Butler, Android: Changing the mobile landscape, Pervasive Computing, IEEE, vol. 10, no. 1, pp. 4 7, [2] Apple cedes market share in smartphone operating system market as android surges and windows phone gains, according to idc, idc.com/getdoc.jsp?containerid=prus [3] L. Aderemi, Android as a gaming platform: Talk in the mobile game forum, [4] Mobile Game Forum, [5] Z. Street, Statistics from the mobile games forum, gamesbrief.com/2012/01/statistics-from-the-mobile-games-forum/, [6] F. I. Younus, What s new for mobile and virtual gaming this year, whats-new-for-mobile-and-virtual-gaming-this-year.html, [7] apktool: A tool for reverse engineering Android apk files, google.com/p/android-apktool/. [8] A. Developers, [9] A. Pathak, Y. C. Hu, and M. Zhang, Where is the energy spent inside my app?: fine grained energy accounting on smartphones with eprof, in Proceedings of the 7th ACM european conference on Computer Systems. ACM, 2012, pp [10] A. Tongaonkar, S. Dai, A. Nucci, and D. Song, Understanding mobile app usage patterns using in-app advertisements, in Passive and Active Measurement. Springer, 2013, pp [11] TCPDUMP/LIBPCAP public repository, [12] X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Profiledroid : Multilayer profiling of android applications, in Proc. of ACM MobiSys, [13] M. Cho, H. J. Lee, M. Kim, and S. W. Kim, Androscope: An insightful performance analyzer for all software layers of the android-based systems, ETRI Journal, vol. 35, no. 2, pp , Apr [14] F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck, Profiling resource usage for mobile apps: a cross-layer approach, in Proc. of ACM MobiSys, [15] S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song, Networkprofiler: Towards automatic fingerprinting of android apps, in Proceedings of the 32nd IEEE International Conference on Computer Communications, INFOCOM, [16] R. Mittal, A. Kansal, and R. Chandra, Empowering developers to estimate app energy consumption, in Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012, pp [17] X. Ma, P. Huang, X. Jin, P. Wang, S. Park, D. Shen, Y. Zhou, L. K. Saul, and G. M. Voelker, edoctor: automatically diagnosing abnormal battery drain issues on smartphones, in Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2013, pp [18] A. Pathak, Y. C. Hu, and M. Zhang, Bootstrapping energy debugging on smartphones: a first look at energy bugs in mobile devices, in Proceedings of the 10th ACM Workshop on Hot Topics in Networks. ACM, 2011, p. 5. [19] A. Pathak, Y. C. Hu, M. Zhang, P. Bahl, and Y.-M. Wang, Finegrained power modeling for smartphones using system call tracing, in Proceedings of the sixth conference on Computer systems. ACM, 2011, pp [20] A. Jindal, A. Pathak, Y. C. Hu, and S. Midkiff, Hypnos: understanding and treating sleep conflicts in smartphones, in Proceedings of the 8th ACM European Conference on Computer Systems. ACM, 2013, pp [21] F. Xu, Y. Liu, T. Moscibroda, R. Chandra, L. Jin, Y. Zhang, and Q. Li, Optimizing background sync on smartphones, in Proc. of the ACM MobiSys, 2013, pp [22] R. LiKamWa, B. Priyantha, M. Philipose, L. Zhong, and P. Bahl, Energy characterization and optimization of image sensing toward continuous mobile vision. Mobisys, 2013.
What is Eating Up Battery Life On My SmartPhone: A Case Study
What is Eating Up Battery Life On My SmartPhone: A Case Study Grace Metri *, Abhishek Agrawal *, Ramesh Peri *, and Weisong Shi Department of Computer Science, Wayne State University, Detroit, Michigan
ProfileDroid: Multi-layer Profiling of Android Applications. Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos
ProfileDroid: Multi-layer Profiling of Android Applications Xuetao Wei Lorenzo Gomez Iulian Neamtiu Michalis Faloutsos How do we know what is occuring in an app? Description, connections, services? >550
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
Understanding Mobile App Usage Patterns Using In-App Advertisements
Understanding Mobile App Usage Patterns Using In-App Advertisements Alok Tongaonkar 1,ShuaifuDai 2,3, Antonio Nucci 1, and Dawn Song 3 1 Narus Inc, USA 2 Peking University, China 3 University of California,
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Review On Google Android a Mobile Platform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 21-25 Review On Google Android a Mobile Platform Shyam Bhati 1, Sandeep Sharma
Frameworks & Android. Programmeertechnieken, Tim Cocx
Frameworks & Android Programmeertechnieken, Tim Cocx Discover thediscover world atthe Leiden world University at Leiden University Software maken is hergebruiken The majority of programming activities
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
OpenCV on Android Platforms
OpenCV on Android Platforms Marco Moltisanti Image Processing Lab http://iplab.dmi.unict.it [email protected] http://www.dmi.unict.it/~moltisanti Outline Intro System setup Write and build an Android
Detecting privacy leaks in Android Apps
Detecting privacy leaks in Android Apps Li Li, Alexandre Bartel, Jacques Klein, and Yves le Traon University of Luxembourg - SnT, Luxembourg {li.li,alexandre.bartel,jacques.klein,yves.letraon}@uni.lu Abstract.
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
KomliMobile Android SDK
KomliMobile Android SDK Overview Komlimobile Ad banner use a small portion of the screen to entice users to "click through" to a richer, full-screen experience such as a website or app store page. To display
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
The Android Developers Guide to 3 rd -Party SDK Assessment and Security
SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed
ECE 455/555 Embedded System Design. Android Programming. Wei Gao. Fall 2015 1
ECE 455/555 Embedded System Design Android Programming Wei Gao Fall 2015 1 Fundamentals of Android Application Java programming language Code along with any required data and resource files are compiled
Shuaifu Dai 1,3, Alok Tongaonkar 2, Xiaoyin Wang 3, Antonio Nucci 2, Dawn Song 3. Presenter: Mario Baldi 2. Peking University, China 2
Shuaifu Dai 1,3, Alok Tongaonkar 2, Xiaoyin Wang 3, Antonio Nucci 2, Dawn Song 3 Presenter: Mario Baldi 2 1 Peking University, China 2 Narus Inc, USA 3 University of California, Berkeley, USA 1 Mobile
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
DiffUser: Differentiated User Access Control on Smartphones
DiffUser: Differentiated User Access Control on Smartphones Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan Department of Computer Science and Engineering The Ohio State University
Mobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
Mocean Android SDK Developer Guide
Mocean Android SDK Developer Guide For Android SDK Version 3.2 136 Baxter St, New York, NY 10013 Page 1 Table of Contents Table of Contents... 2 Overview... 3 Section 1 Setup... 3 What changed in 3.2:...
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Reminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( [email protected] )
Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( [email protected] ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
Evaluating Impact of Cross-platform Frameworks in Energy Consumption of Mobile Applications
Evaluating Impact of Cross-platform Frameworks in Energy Consumption of Mobile Applications Matteo Ciman and Ombretta Gaggi Department of Mathematics, University of Padua, Via Trieste 63, 35121 Padua,
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Android Geek Night. Application framework
Android Geek Night Application framework Agenda 1. Presentation 1. Trifork 2. JAOO 2010 2. Google Android headlines 3. Introduction to an Android application 4. New project using ADT 5. Main building blocks
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
How To Develop Android On Your Computer Or Tablet Or Phone
AN INTRODUCTION TO ANDROID DEVELOPMENT CS231M Alejandro Troccoli Outline Overview of the Android Operating System Development tools Deploying application packages Step-by-step application development The
ANDROID A Workshop on Android Application Development Organized by Computer Science & Engg Dept Lingaya s University
ANDROID A Workshop on Android Application Development Organized by Computer Science & Engg Dept Lingaya s University 2nd, 3rd March 2012 With the experts of i3indya Technologies (A unit of I THREE INFOTECH
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
Running Android Applications on BlackBerry 10 developer.blackberry.com/android
Running Android Applications on BlackBerry 10 developer.blackberry.com/android James Dreher Application Development Consultant BlackBerry Developer Relations Overview BB Runtime for Android Apps Upcoming
Design and Implementation of IaaS platform based on tool migration Wei Ding
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory
MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER
MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER TABLE OF CONTENTS Market Demand for Enterprise Mobile Mobile App Development Approaches Native Apps Mobile Web Apps Hybrid Apps Mendix Vision for Mobile App
Overview. The Android operating system is like a cake consisting of various layers.
The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and
APPLICATION DEVELOPMENT FOR THE IOT ERA. Embedded Application Development Moves to the Cloud
APPLICATION DEVELOPMENT FOR THE IOT ERA Embedded Application Development Moves to the Cloud EXECUTIVE SUMMARY The emergence of the Internet of Things (IoT) is opening up the complex world of embedded systems
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps. Hyeokgon Ryu, Infraware Technology, Ltd.
Publishing to TIZEN Using the Automated Conversion/Repackaging of Existing Android Apps Hyeokgon Ryu, Infraware Technology, Ltd. Talking about Needs of Automated Converting from Android To Tizen Introduce
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
Lecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) <lecturer, date>
Lecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) Outline Smartphones Developing Mobile Applications Android ios BlackBerry Windows Mobile References Cell phones
How Expensive are Free Smartphone Apps?
How Expensive are Free Smartphone Apps? Li Zhang Dhruv Gupta Prasant Mohapatra [email protected] [email protected] [email protected] Computer Science Department, University of California, Davis,
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview
AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle
Android Tutorial. Larry Walters OOSE Fall 2011
Android Tutorial Larry Walters OOSE Fall 2011 References This tutorial is a brief overview of some major concepts Android is much richer and more complex Developer s Guide http://developer.android.com/guide/index.html
Two-factor Protection Scheme in Securing the Source Code of Android Applications
Two-factor Protection Scheme in Securing the Source Code of Android Applications Daniel TSE [email protected] Ka Fai WONG [email protected] Zihuan LI [email protected] Wai Hou CHOI
Android Security Evaluation Framework
INTRODUCING... A S E F Android Security Evaluation Framework - Parth Patel $ whoami_ Agenda Manual Research Automation - A S E F Let s solve problems Conclusion Android OS Open Source Security Evaluation
Android Application for Accessing KNX Devices via IP Connection
Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Workshop on Android and Applications Development
Workshop on Android and Applications Development Duration: 2 Days (8 hrs/day) Introduction: With over one billion devices activated, Android is an exciting space to make apps to help you communicate, organize,
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
Android Application Analyzer
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume. 1, Issue 4, August 2014, PP 32-37 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Android
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Mobile and Cloud computing and SE
Mobile and Cloud computing and SE This week normal. Next week is the final week of the course Wed 12-14 Essay presentation and final feedback Kylmämaa Kerkelä Barthas Gratzl Reijonen??? Thu 08-10 Group
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Lab 0 (Setting up your Development Environment) Week 1
ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself
