For the last few years, android is known to be the most widely used operatingsystem and this rapidly increasing popularity has attracted the malware developers attention. android allows downloading and installation o...
详细信息
For the last few years, android is known to be the most widely used operatingsystem and this rapidly increasing popularity has attracted the malware developers attention. android allows downloading and installation of apps from other unofficial market places. This gives malware developers an opportunity to put repackaged malicious applications in third-party app-stores and attack the android devices. A large number of malware analysis and detection systems have been developed which uses static analysis, dynamic analysis, or hybrid analysis to keep android devices secure from malware. However, the existing research clearly lags in detecting malware efficiently and accurately. For accurate malware detection, multilayer analysis is required which consumes large amount of hardware resources of resource constrained mobile devices. This research proposes an efficient and accurate solution to this problem, named SAMADroid, which is a novel 3-level hybrid malware detection model for android operating systems. The research contribution includes multiple folds. First, many of the existing android malware detection techniques are thoroughly investigated and categorized on the basis of their detection methods. Also, their benefits along with limitations are deduced. A novel 3-level hybrid malware detection model for android operating systems is developed, that can provide high detection accuracy by combining the benefits of the three different levels: 1) Static and Dynamic Analysis;2) Local and Remote Host;and 3) Machine Learning Intelligence. Experimental results show that SAMADroid achieves high malware detection accuracy by ensuring the efficiency in terms of power and storage consumption.
This paper presents an experimental study to explore android operating system (OS) behaviour under different conditions. An android application is developed and introduced in this paper for collecting the system memor...
详细信息
ISBN:
(纸本)9781509002900
This paper presents an experimental study to explore android operating system (OS) behaviour under different conditions. An android application is developed and introduced in this paper for collecting the system memory information. In the experiments, stress tests with fixed level and with exponential level are conducted on the android OS to explore the software aging phenomenon under different conditions. The experimental results indicate that software aging problem exists in android OS under stress test with fixed level and with exponential level. This study is the first step to explore software aging phenomenon in the android OS.
This paper is to develop Thai Rice Implantation Recommend system based on androidsystem. This application serves as an important channel to support and provide the rice harvest information like how to cultivate, how ...
详细信息
This paper is to develop Thai Rice Implantation Recommend system based on androidsystem. This application serves as an important channel to support and provide the rice harvest information like how to cultivate, how to treatment of rice diseases and how to know time alert period of crop protection for Thai farmers in central zone of Thailand. To evaluate the preliminary prototype system, questionnaires were used to measure user satisfaction with system usability by experts and users. Experimental results reveal that the system is well able to recommend rice harvest information both users and experts and this application can be adapted to users easily due to the fact that the data is stored and available on mobile devices. Also the results were satisfied in the effectiveness as well follows: Means for specialist and users were 4.00 and 4.01 respectively, and standard deviation for specialists and users were 0.51 and 0.66 respectively.
Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general an...
详细信息
ISBN:
(纸本)9781479969296
Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on android operating system. android OS is the widely used Smartphone operatingsystems with huge user base. Everyday hundreds and thousands of application are added to the repository of android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.
In the field of computer, android operating system is a new smart phone platform developed by Google Company. Through the analysis of platform, its advantages are no boundaries between applications, openness, rapid an...
详细信息
ISBN:
(纸本)9783038351153
In the field of computer, android operating system is a new smart phone platform developed by Google Company. Through the analysis of platform, its advantages are no boundaries between applications, openness, rapid and convenient application development, and equality application, etc. On this basis, this article makes the in-depth study of androidsystem architecture, development and application of related important functional components and related problems such as environment configuration and verifies the availability of the android platform finally by means of relatively short message application.
Malware designers and developers persistently endeavor to target smartphone users with the aim of collecting personal information, infringing on their privacy, and jeopardizing their security. Researchers from both ac...
详细信息
Malware designers and developers persistently endeavor to target smartphone users with the aim of collecting personal information, infringing on their privacy, and jeopardizing their security. Researchers from both academia and industry have leveraged deep learning algorithms to develop theoretical and practical approaches for detecting potential threats. This survey provides an extensive discussion of recent and relevant approaches that have been published, unveiling emerging technologies and highlighting lingering challenges in malware detection.
android operating system is known as one of the most popular mobile operatingsystems. The malware intrusion increases in the same pace as the production of applicable software. Propagation of new and transformed malw...
详细信息
android operating system is known as one of the most popular mobile operatingsystems. The malware intrusion increases in the same pace as the production of applicable software. Propagation of new and transformed malware in seconds is a critical challenge in malware detection. android software supplies thousands of features, providing assistance to identify malware applications. In this paper, a novel method based on a random forest algorithm, which applied three different feature selection techniques is proposed. This paper assesses the consequence of applying three different feature selection types including effective, high weight and effective group feature selection. Experiments conducted on Drebin dataset indicate applying the feature selection methods ameliorate the accuracy in terms of metrics and required time. In addition, comparison between the candidate feature selection model and a variety of algorithms as baselines proves the merit of applying feature selection on Random Forest, which outperforms other models based on several metrics.
Software aging - the phenomenon affecting many long-running systems, causing performance degradation or an increasing failure rate over mission time, and eventually leading to failure - is known to affect mobile devic...
详细信息
Software aging - the phenomenon affecting many long-running systems, causing performance degradation or an increasing failure rate over mission time, and eventually leading to failure - is known to affect mobile devices and their operatingsystems, too. Software rejuvenation - the technique typically used to counteract aging - may compromise the user's perception of availability and reliability of the personal device, if applied at a coarse grain, e.g., by restarting applications or, worse, rebooting the entire device. This article proposes a configurable micro-rejuvenation technique to counteract software aging in android-based mobile devices, acting at a fine-grained level, namely on in-memory system data structures. The technique is engineered in two phases. Before releasing the (customized) android version, a heap profiling facility is used by the manufacturer's developers to identify potentially bloating data structures in android services and to instrument their code. After release, an aging detection and rejuvenation service will safely clean up the bloating data structures, with a negligible impact on user perception and device availability, as neither the device nor operatingsystem's processes are restarted. The results of experiments show the ability of the technique to provide significant gains in aging mobile operatingsystem responsiveness and time to failure. (c) 2021 Elsevier Inc. All rights reserved.
Due to the recent advancement in cellular communication and android operating system, most of the people prefer android mobile phones for their day-to-day activities. The main advantages of android smart device are it...
详细信息
This study proposed novel authentication of blowing voiceless password for android smartphones. Experiments were conducted in three stages. First, a microphone sensor was used to solve the problems of eavesdropping of...
详细信息
This study proposed novel authentication of blowing voiceless password for android smartphones. Experiments were conducted in three stages. First, a microphone sensor was used to solve the problems of eavesdropping of voice passwords and decoding passwords through lip movement (even behind a wall). Second, a Huawei tablet T1-701u device was used to test the developed authentication app. Third, pattern analysis was utilised by two metrics (i.e. false rejection rate [FRR] and false acceptance rate [FAR]) to analyse usability. Moreover, the usability of previous authentication schemes was experimented upon using two experimental settings (i.e. controlled and uncontrolled). Age group comparison was made to enrich the analysis and provide a comprehensive insight for usability with sample size (n = 211;male = 150 and female = 61 participants). Discussion results show the following: (1) The remember rate of the first uncontrolled mode is 8.22%. (2) The remember rate of the controlled mode is 42.30%. Imposters were incapable of infiltrating phone authentication. The air blown into the microphone was not observed by imposters. Thus, imposters were unable to imitate the blowing. (3) With a microphone sensor, the FAR was lower than the FRR. (4) The average result across all age groups for both genders is 22.36%. This result is promising because it considers the environmental settings and restrictions made during the experiment.
暂无评论