نتایج جستجو برای: android application

تعداد نتایج: 772242  

Journal: :JDFSL 2012
Larry Melling Robert Zeidman

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications ...

2017
Tyler Vernon Smith Alexander Afanasyev Lixia Zhang

In this report I discuss my Master’s capstone project, ChronoChat-android, an implementation of the ChronoChat instant message application for Android mobile devices [7]. ChronoChat-android allows communication in a chatroom cooperatively hosted by ChronoChat clients. As in other ChronoChat implementations, chatroom participants may be connected via an NDN hub; ChronoChat-android also supports ...

2013
Zarni Aung Win Zaw

Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...

Journal: :IJEEI 2013
Kyoung-Soo Han Yeo Reum Lee Biao Jiang Eul Gyu Im

Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Androi...

Journal: :J. UCS 2016
Ajay Kumar Jha Woo Jin Lee

Being one of the major operating system in smartphone industry, security in Android is paramount importance to end users. Android applications are published through Google Play Store which is an official marketplace for Android. If we have to define the current security policy implemented by Google Play Store for publishing Android applications in one sentence then we can write it as “all are s...

2013
Ahmad Talha Siddiqui Munesh Chandra Trivedi

The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In thi...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

2013
Shoab Ahmad Khan

Android operating system is designed for use in mobile computing by The Open Handset Alliance. Android market has hundreds of thousands of Android applications and these applications are restricted only to the mobiles. This restriction is mainly because of portability and compatibility issues of Android operating system. So need of employing these countless Android applications on any POISX Des...

2013
Daniel Schreckling Stephan Huber Focke Höhne Joachim Posegga

URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. This work describes how the detection and analysis of widely distributed and security critical adware plugins is achieved. We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applica...

2011
Assem Nazar Mark M. Seeger Harald Baier

The majority of malware seen on Android has a top-down approach often targeting application programming interfaces (API) of the financially rewarding telephony and short message service (SMS). In this paper we present a proof of concept of compromising an Android based smartphone by targeting the underlying Linux kernel. We adopt an unorthodox bottom-up approach on modifying the operating syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید