A monitoring method of sensitive calls based on the Android platform software behavior Cheng Sun, Sujuan Qin
|
|
|
- Whitney Rogers
- 9 years ago
- Views:
Transcription
1 5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015) A monitoring method of sensitive calls based on the Android platform software behavior Cheng Sun, Sujuan Qin State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, , China State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, , China [email protected], [email protected] Keywords: Android security, API Monitor, Xposed Abstract. In recent years, due to the Android system, good openness and portability features, Android mobile phone system was able to end the rapid popularization and rapid development, providing a major service on the Android platform based on the Android platform for mobile software that is Android APP. Meanwhile, the open-source Android system, making the Android system itself is vulnerable to security issues; other Android system itself permission mechanism, also led to the abuse of privileges and authority Android APP inconsistent application problems. To solve these problems, this paper design a new framework based Xposed Android APP sensitive call behavior monitoring system for domestic several famous non-famous APP test, compared to the previous test mode awakened analysis of effectiveness, accuracy, and software performance assessment, the results show that this solution can provide more efficient, convenient, and accurate monitoring of the sensitive situation of APP API calls. 1. Introduction With the rapid development of mobile Internet, the emergence of an increasingly rich Internet services, bring convenience, but abuse flooding APP permissions to public life. Ordinary users of Android phones are often unable to detect the use of APP in the background without the user's permission which were operating illegally. Specifically, users download and run a stand-alone game APP, Normally, such an APP would call some audio API interface, but some illegal APP will take the initiative to apply for networking, viewing contacts, location information, etc. private information permission. When the users use the APP, the private information of the phone will be leaked eventually through the background, and users themselves do not detect[3]. Paper[1] proposes a dynamic test under the environment by injecting HOOK way to hacker mode interference Android system uptime, obtain APP sensitive interfaces during operation call situation. By this way HOOK technology, injected So library functions can be directly in the underlying Android running on the target system in the process, when the process is responsible for APP application provides functionality will be noticed and get the address of the ioctl function, ioctl function Binder is responsible for the transmission of data communications, including calls for the descriptor function and code, intercepted ioctl function to deal with the object and remove the corresponding descriptor and code, the final output by Log function Android SDK development kit android.util.log in Log into logcat, complete the monitoring. This process, by monitoring the process responsible for providing functions to complete the functionality of the API to provide surveillance, have the following questions: 1. HOOK injected into the process to be run So stored files, since the monitor is not released after each Operation will waste a lot of memory to run too long after the process will lead to the collapse of even a system crash; 2. complex permission request, the underlying need to obtain root privileges before they can run linux So file; 3 each time only for one injection process When API monitor incomplete case sensitive API APP call different process occurs; The authors - Published by Atlantis Press 305
2 4 for matching descriptor and the code is to get in C / C ++, due out Java layer, where the matching data need to Android source code Get, the process is cumbersome [4]. Aiming at the above problems [5], propose appropriate solutions. Experimental results show that this scheme has many advantages: improve the integrity of API monitoring, Reducing the difficulty of obtaining matching data, simply need root privileges, improve the stability and efficiency of the program. Organizational structure of this paper are as follows: Section II describes and analyzes the Xposed Framework and its implementation principle; Section III for specific requirements process running Android APP API monitoring, design and implementation monitoring module; Section IV for several well-known domestic non-barrier Android APP famous test experiments, analysis of experimental data; Section V final summary presentation and related work. 2. Design and Implementation of monitoring system based on Xposed framework 2.1 Monitoring System. As mentioned earlier in paper [2], Xposed framework will load XposedBridge.jar package all running APP process, now do not need to run APP violent disturbances [6][7], but the process needs to run APP, APP call API interface to obtain information, here to make the following design: 1. hook XposedBridge.jar package provided () function, before Zygote process starts, complete function HOOK process needs to be monitored. 2. Examples of XC_MethodHook class that implements beforehookedmethod and afterhookedmethod method, these two functions are being HOOK before the function call and the call after the execution, where you can add log output in the corresponding function in after. 3. monitored maintain API library, where all required monitoring functions save descriptor, it can be implemented by HashMap. 4. Log log processing module, automatic output more readable log. Figure I. Design flow 2.2 System key algorithms and code implementation. First, you need to start before the Android system to complete the setup function Hook operation, although Xposed help function injection, but we need to define their own specific function here () function processed through hookall, custom initzygote () function to achieve this operation. Code: void initzygote () { hookall (XSmsManager.getInstances ()); 306
3 // SMS Manager hookall (XActivityManager.getInstances ()); // Activity Manager } hookall () custom function, passing parameters of type enum type, enumerate various methods need to be monitored. Here a SMS Manager, for example, include its class diagram. Figure II. Injection principle SmsManager 3. Assessment and analysis of experimental data 3.1 Purpose and methods Experimentally using the following diagram flowchart, the environment is already installed Android4.0 mobile devices ZTE 930HD, by way of the following figure, were tested micro-channel, high moral map, Caculitor Calculator Get the resulting three APP testing methods described herein log log, comparative data log log [1] test methods were a comparison, final conclusion ---- proposed new test method described herein is more efficient, more comprehensive, more convenient and easier to maintain. 307
4 Figure III. Experimental flow chart 3.2 Data Analysis Micro-channel running Android version during background monitoring has been carried out to obtain the following data: Runtime:loadLibrary Configuration.MCC(null;null) ActivityManager: getrecenttasks(null;null) ActivityManager: getrunningtasks(null;null) TelephonyManager:getDeviceId(null;null) ConnectivityManager: Connectivity.getAllNetworkInfo(null;null) NetworkInfo: NetworkInfo.isConnected(null;null) WifiManager: WiFi.getConnectionInfo(null;null) LocationManager:requestLocation(null;null) IoBridge:connect(sdk.open.talk.gepush.com/ :5224;null) TelephonyManager:getSimOperator(null;null) PackageManager:getPackagesForUid(10033;null) The data above, there are function names, function names and some parameters (already except weight); by calling the library, we learned that the actual use of micro-channel permissions: android.permission.access_coarse_location android.permission.read_phone_state android.permission.read_contacts android.permission.access_fine_location android.permission.access_network_state android.permission.access_wifi_state android.permission.bluetooth android.permission.broadcast_sms android.permission.camera By comparison with the micro-channel real application permissions, obtained without the use of multi-application permissions are: android.permission.internet" android.permission.modify_audio_settings android.permission.receive_boot_completed android.permission.record_audio android.permission.read_sms android.permission.vibrate android.permission.wake_lock android.permission.write_external_storage 308
5 android.permission.write_settings com.android.launcher.permission.install_shortcut android.permission.broadcast_sticky com.tencent.mm.location.permission.send_view com.android.launcher.permission.install_shortcut Through the data, the micro-channel App actual usage rights is far less than for authority, while at the same time, our monitoring tool can also monitor the actual real state API function calls, function calls can be seen in the main Java function calls, so monitor the performance of more than [1] in a way, it is the operation and maintenance aspects of the library to consider, where monitoring of Java layer function, more than paper[1] the C-level function match. 4. Summary and further work Through the development of the new module Xposed framework for Android APP to monitor sensitive API interface libraries establish sensitive, to generate a complete log. Get the complete APP sensitive behavior in the course of running this way and recorded. Also continue to expand the library sensitive, making it possible to monitor the data more and more information. API calls of APP can be well monitored in the run-time. Acknowledgment This work is supported by NSFC (Grant Nos , ), the Fundamental Research Funds for the Central Universities (Grant No. 2015RC23). References [1]. Pang Zhou, RESEARCH AND IMPLEMENTATION OF DYNAMIC TESTING SYSTEM FOR APPLICATIONS ON ANDROID SYSTEM(master's degree, Beijing University of Posts and Telecommunications, China 2015).p.37 [2]. Lutkowski, Skulimowski, Poryzała. An optical data transmission system for blind persons by means of a mobile phone with the Android operating system. International Journal of Adaptive Control and Signal Processing. Lodz, Poland, , p [3]. Gunadi, Hendra,Tiu, Alwen. Efficient runtime monitoring with metric temporal logic: A case study in the android operating system. 19th International Symposium on Formal Methods. Australia, ,p [4]. Park, Jiyeon,Kim, Bongjae,Kim, Sung-Ryul, Yoon, Jin Hyun,Cho, Yookun.Performance analysis of security enforcement on Android operating system ACM Research in Applied Computation Symposium. Korea, ,p [5]. Dipert, Brian. Fundamentals of the android operating system. Electronic Products. United States, ,p [6]. De La Cruz Briyith,Cuellar Ricardo,Rojas Ermin, Molina Valentín,Robles Horderlin Vrangel. Appropriation of Bluetooth technology and the Android operating system for solving problems in biomedical engineering. Case study: ECG signal transmission system to Android mobile system via Bluetooth. 13th Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, CISCI. Colombia, ,p [7]. Moon,Sung Wook,Kim Myeong,Ho Jun Cha,Nam Ju,Kim Dong. Implementation of smartphone environment remote control and monitoring system for Android operating system-based robot platform th International Conference on Ubiquitous Robots and Ambient Intelligence, ,p
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
The Android Developers Guide to 3 rd -Party SDK Assessment and Security
SESSION ID: MBS-F02 The Android Developers Guide to 3 rd -Party SDK Assessment and Security Yang Yang( 杨 德 志 ) Mobile Security Researcher and Developer, Trend Micro Advantages of 3 rd -Party SDKs Speed
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
VitalJacket SDK v1.0.07 Technical Specifications
VitalJacket SDK v1.0.07 Technical Specifications Edíficio Olympus II LEGAL NOTICE AND DISCLAIMER ATENTION: Although VitalJacket is a certified medical device, its developer version is NOT certified for
SoMA. Automated testing system of camera algorithms. Sofica Ltd
SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional
Design and Implementation of IaaS platform based on tool migration Wei Ding
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
VitalJacket SDK v1.0.03 Technical Specifications
VitalJacket SDK v1.0.03 Technical Specifications Edíficio Olympus I Page2 LEGAL NOTICE AND DISCLAIMER ATENTION: Although VitalJacket is a certified medical device, its developer version is NOT certified
COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM)
COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM) 0 TEAM MEMBERS SYED HUSSAIN RAZA NAQVI SYED MUHAMMAD TAHIR RAZA MUHAMMAD
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Mobile Advertising Security Risk Assessment Model Based on AHP
International Symposium on Computers & Informatics (ISCI 2015) Mobile Advertising Security Risk Assessment Model Based on AHP Jing Li 1, Hui Fei 2,ei Jin 1 1 Computer Network Emergency Response Technical
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
AndroLIFT: A Tool for Android Application Life Cycles
AndroLIFT: A Tool for Android Application Life Cycles Dominik Franke, Tobias Royé, and Stefan Kowalewski Embedded Software Laboratory Ahornstraße 55, 52074 Aachen, Germany { franke, roye, kowalewski}@embedded.rwth-aachen.de
Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
Application of Android OS as Real-time Control Platform**
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 2 http://dx.doi.org/10.7494/automat.2013.17.2.197 Krzysztof Ko³ek* Application of Android OS as Real-time Control Platform** 1. Introduction An android operating
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
Issues in Android on Mobile Platform and Their Resolution
Issues in Android on Mobile Platform and Their Resolution 1 Monika A. Ganpate, 2 Dipika R. Shinde 1, 2 Institute of Management and Computer Studies, Thane (West), India, University of Mumbai, India Abstract:
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER Oct 2013 INTRODUCTION TWO TECHNOLOGY CATEGORIES Application virtualization technologies can be divided into two main categories: those that require an
Why NetDimensions Learning
Why NetDimensions Learning Quick To Implement Lower overall costs NetDimensions Learning can be deployed faster and with fewer implementation services than almost any other learning system in the market.
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Understanding Android s Security Framework
Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications
Design and Implementation of an Android Host-based Intrusion Prevention System
Design and Implementation of an Android Host-based Intrusion Prevention System Mingshen Sun, Min Zheng, John C.S. Lui, Xuxian Jiang The Chinese University of Hong Kong, Qihoo 360 & NC State University
Next Gen Platform: Team & Mentor Guide
Next Gen Platform: Team & Mentor Guide 1 Introduction For the 2015-2016 season, the FIRST Tech Challenge (FTC) will be adopting a new controller for its robot competitions. The new platform, which will
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
A Look through the Android Stack
A Look through the Android Stack A Look through the Android Stack Free Electrons Maxime Ripard Free Electrons Embedded Linux Developers c Copyright 2004-2012, Free Electrons. Creative Commons BY-SA 3.0
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Chapter 13: Program Development and Programming Languages
15 th Edition Understanding Computers Today and Tomorrow Comprehensive Chapter 13: Program Development and Programming Languages Deborah Morley Charles S. Parker Copyright 2015 Cengage Learning Learning
WWW.SANS.ORG. Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015
Security Evaluation of Mobile Applications using 'App Report Cards': Android By Raul Siles October 2015 This article introduces the SANS SEC575 mobile 'App Report Cards' project and provides details on
WebView addjavascriptinterface Remote Code Execution 23/09/2013
MWR InfoSecurity Advisory WebView addjavascriptinterface Remote Code Execution 23/09/2013 Package Name Date Affected Versions Google Android Webkit WebView 23/09/2013 All Android applications built with
The Construction of SME Accounting Information System
The Construction of SME Accounting Information System LIU Zhihua School of Business Administration, Jiangxi University of Finance and Economics, P.R. China, 330013 [email protected] Abstract: SMEs have become
Leave The App Alone! - Attack and Defense of Android App Hijack
Leave The App Alone! - Attack and Defense of Android App Hijack SESSION ID:MBS-W05 Rongyu Zhou Senior Research Engineer Baidu Inc. Outline Root or Not Root App Hijack Hook Insight Demo: App Hijack Detection
A Review OnEmployee Monitoring Application Using Android Smartphone s Neha S. Mankar 1, Sweeti M. Shambharkar 2 and Asst. Prof. Priti P.
A Review OnEmployee Monitoring Application Using Android Smartphone s Neha S. Mankar 1, Sweeti M. Shambharkar 2 and Asst. Prof. Priti P. Dafale 3 [email protected] 1 [email protected] 2 [email protected]
A B S T R A C T. Keywords: Mobile computing, Compiler, Android Development tool kit; I. INTRODUCTION
Remote Access Android Phones Through Simple Mobile. 1M.S.Badgujar, 2N.D.Tribhuvan, 3S.U.Rahane,4Prof.C.S.Aryan Department of Computer Engg, Jaihind College Of Engg, Kuran Savitribai Phule Pune University,
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Understand and Build Android Programming Environment. Presented by: Che-Wei Chang
Real Time System Project 1 Understand and Build Android Programming Environment Advisor: Prof. Tei-Wei i Kuo Presented by: Che-Wei Chang Outline Introduction to Android Framework What is Android Android
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Design of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
ANDROID LEVERED DATA MONITORING ROBOT
ANDROID LEVERED DATA MONITORING ROBOT 1 HIMANI PATHAK, 2 VIDYALAKSHMI KRISHNAKUMAR, 3 SHILPA RAVIKUMAR, 4 AJINKYA SHINDE 1,2,3,4 Electronics & Telecommunication Engineering, Fr. C. R. Institute of Technology,
Course Summary. Prerequisites
Course Summary Kony MobileFabric 6.5 The Kony MobileFabric course is intended for developers and integrators working with Kony MobileFabric and Kony Studio. This course consists of 6 self-paced modules,
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development
Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup
Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster.
Know your enemy and know yourself and you can fight a hundred battles without disaster. Sun Tzu Class Objectives Threat Model Express Create quick, informal threat models 2012 Security Compass inc. 2 1
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring
AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Cid Santos Luis Matos. Introduction to AllJoyn
1 Cid Santos Luis Matos Introduction to AllJoyn 1 2 3 4 5 What is AllJoyn? How AllJoyn works Setup your Android Dev. Environment Development with java SDK Questions & Answers Agenda 3 Why Can t All Our
Research on the Course of Network Performance Testing and Analysis
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Telephone Acceptable Use Policy (ISP05)
Telephone Acceptable Use Policy (ISP05) Issue Date: December 2014 Version 3 Document Control 3 1. Policy Statement 4 2. Introduction 4 3. Responsibilities 4 4. Breach of Policy 5 5. Service Standards:
PART I: WELCOME TO THE WONDERFUL WORLD OF ACCESSORIES CHAPTER 1: INTRODUCTION TO ANDROID OPEN ACCESSORY 3
INTRODUCTION xxi PART I: WELCOME TO THE WONDERFUL WORLD OF ACCESSORIES CHAPTER 1: INTRODUCTION TO ANDROID OPEN ACCESSORY 3 I, Android 3 The Three Laws of Android 4 The Android Philosophy 6 Other Popular
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
Urban planning and management information systems analysis and design based on GIS
Available online at www.sciencedirect.com Physics Procedia 33 (2012 ) 1440 1445 2012 International Conference on Medical Physics and Biomedical Engineering Urban planning and management information systems
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
DEPARTMENT OF PUBLIC WORKS AND HIGHWAYS TROUBLE TICKETING SYSTEM
DEPARTMENT OF PUBLIC WORKS AND HIGHWAYS TROUBLE TICKETING SYSTEM Rocelyn Nicole Alicbusan, Emar Nathniel de Pano, Jed Kevin Fermo, Brian Joseph Tan, and Marivic Tangkeko 1 1 Center for ICT for Development
Lecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) <lecturer, date>
Lecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) Outline Smartphones Developing Mobile Applications Android ios BlackBerry Windows Mobile References Cell phones
Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
Fig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
The Design and Application of Water Jet Propulsion Boat Weibo Song, Junhai Jiang3, a, Shuping Zhao, Kaiyan Zhu, Qihua Wang
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) The Design and Application of Water Jet Propulsion Boat Weibo Song, Junhai Jiang3, a, Shuping Zhao,
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Priority Based Pre-emptive Task Scheduling for Android Operating System
International Journal of Computer Science and Telecommunications [Volume 2, Issue 7, October 2011] 17 ISSN 2047-3338 Priority Based Pre-emptive Task Scheduling for Android Operating System Deepali Kayande
Mobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
A Modular Approach to Teaching Mobile APPS Development
2014 Hawaii University International Conferences Science, Technology, Engineering, Math & Education June 16, 17, & 18 2014 Ala Moana Hotel, Honolulu, Hawaii A Modular Approach to Teaching Mobile APPS Development
Building Applications with ArcGIS Runtime SDK for ios Part II. Eric Ito and Scott Sirowy
Building Applications with ArcGIS Runtime SDK for ios Part II Eric Ito and Scott Sirowy Building Applications with ArcGIS Runtime SDK for ios Part II Eric Ito and Scott Sirowy 2011 Dev Summit Dodgeball
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect. Steven Arzt. 04.10.2015 Secure Software Engineering Group Steven Arzt 1
All Your Code Belongs To Us Dismantling Android Secrets With CodeInspect Steven Arzt 04.10.2015 Secure Software Engineering Group Steven Arzt 1 04.10.2015 Secure Software Engineering Group Steven Arzt
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,
Frequently asked questions
Frequently asked questions FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform.
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
Getting Started Android + Linux. February 27 th, 2014
Getting Started Android + Linux February 27 th, 2014 Overview AllJoyn: High-level architecture Sample AllJoyn Apps for Android, Linux Downloading the AllJoyn Android SDKs Building the Sample AllJoyn Android
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
