نتایج جستجو برای: android
تعداد نتایج: 11695 فیلتر نتایج به سال:
Driven by the popularity of the Android system, Android app markets enjoy a booming prosperity in recent years. One critical problem for modern Android app markets is how to prevent apps that are going to receive low ratings from reaching end users. For this purpose, traditional approaches have to publish an app first and then collect enough user ratings and reviews so as to determine whether t...
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant challenge for several reasons: (1) graphics performance is important due to popularity of games an...
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
In this paper, we present a systematic study for the detection of malicious applications (or apps) on popular Android Markets. To this end, we first propose a permissionbased behavioral footprinting scheme to detect new samples of known Android malware families. Then we apply a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malicious families. We implemented...
The Android operating system runs atop the Linux kernel, yet lacks the ability to natively execute standard Linux desktop applications. Though efforts have been made to enable this functionality, all approaches to date require a user to switch to a separate desktop environment, resulting in a substantial loss of interface consistency and usability. This paper describes DebianRunner, an Android ...
The existing I/O workload generators and trace capturing tools are not adaptable to generating nor capturing the I/O requests of Android apps. The Android platform needs proper tools to capture and replay real world workload in the Android platform to verify the result of benchmark tools. This paper introduces Android Storage Performance Analysis Tool, AndroStep, which is specifically designed ...
....................................................................... iii ACKNOWLEDGEMENTS...................................................... iv TABLE OF CONTENTS......................................................... v LIST OF TABLES................................................................. ix LIST OF FIGURES............................................................... x CHAPTE...
Over the last two years Android became the most popular mobile operating system. But Android is also targeted by an over-proportional share of malware. In this paper we systematize the knowledge about the Android security mechanisms and formulate how the pitfalls can be avoided when building a mobile operating system. As smartphones enter the corporate domain, a new scheme called bring your own...
In this paper we will look at the Android platform and Android based mobile application development & its security. Further we will look to explore an Android application available in google play store My Notepad. This application is used to save notes by using easy direct manipulation. It is featured with functions as Voice Navigation and Voice Based Searching, it requires internet connection ...
Mobile forensic is fast becoming an abbreviated term that describes the process of applying digital forensics in mobile phones world. The rapid development in mobile phones industry has led to the emergence of the so-called smart phones which have become nearly the same as computers. Android Smartphones refer to all types of smartphones that use Android operating system. This paper aims to surv...
The use of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has increased. Google offers programmers the opportunity to upload and sell applications in the Android Market, but malware writers upload their malicious code there. In light of this backgroun...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید