Fully Undetectable Remote Access Trojan: Android

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vnc Architecture Based Remote Desktop Access through Android Mobile Phones

In this paper, we will enlist the process to access the desktops of remote computer systems with the use of a android based cellular phone. This process will be carried out using Virtual Network Computing based architecture. A user will be able to access and manipulate the desktops of remote computers through a VNC viewer that will be provided on the user's cell-phone. Conditions that must be f...

متن کامل

Preamble : Remote Storage in Android Using SCTP

from the last three four years the smart phones are much popular in the people but with this popularity everyone is expecting more and more about the performance and functionality. There are many Smartphone manufacturers providing more and more features day by day. The Smart phones have pick up their market share because of android operating system. With this growing market there are some limit...

متن کامل

Extending Mandatory Access Control Policies in Android

Solutions like SELinux have recently regenerated interest toward Mandatory Access Control (MAC) models. The role of MAC models can be expected to increase in modern systems, which are exposed to significant threats and manage high-value resources, due to the stronger protection they are able to offer. Android is a significant representative of these novel systems and the integration of MAC mode...

متن کامل

Transparent Remote Access

In distributed systems, the different processors communicate via network messages. Object oriented systems do not focus on these messages, but on the responsibilities each object fulfils. Between the top-level objects it should be invisible on which system an addressed object resides. The Transparent Remote Access pattern gives a recipe how the implementation of a method can defer the invocatio...

متن کامل

Remote Access Background

This chapter describes, as an example of the use of remote access, the development of a computer telecommunications network linking primary health care practitioners throughout both the isolated rural and outback areas of Australia and insular urban general practitioners. This project is called the Primary Health Orientated Computer Users’ System, or PHOCUS. Details of project utilisation and u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2019

ISSN: 2321-9653

DOI: 10.22214/ijraset.2019.5182