Filters








165 Hits in 4.3 sec

Certified Lightweight Contextual Policies for Android

Mohamed Nassim Seghir, David Aspinall, Lenka Marekova
2016 2016 IEEE Cybersecurity Development (SecDev)  
We propose a policy-based lightweight approach for the verification and certification of Android applications with respect to a given policy.  ...  This scheme represents a potential future model for app stores where apps are equipped with policies and checkable evidence.  ...  We have presented a policy-based lightweight approach for the verification and certification of Android applications.  ... 
doi:10.1109/secdev.2016.032 dblp:conf/secdev/Seghir0M16 fatcat:x3ewua5nyrcgpmdxdjdbhagwxe

A Dynamic Service Description for Mobile Environments [article]

Rohit Verma, Abhishek Srivastava
2016 arXiv   pre-print
A detailed, dynamic, and lightweight service description is an important requirement for automatic and efficient discovery, selection, and subsequent provisioning of services over mobile devices.  ...  partners, and hardware aspects along with the functional, non-functional, business, and contextual aspects.  ...  We would like to especially thank the anonymous reviewers of SCC 2015 for their valuable feedback and comments on our initial work.  ... 
arXiv:1608.02917v1 fatcat:2w7v6eqmn5clrdcj2sgwiq72cu

Reinventing the share button for physical spaces

Darren Carlson, Bashar Altakrouri, Andreas Schrader
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
The demo highlights how Dynamix enables Web applications to discover rich, high-order contextual information, perform context-aware adaptations, and directly influence the physical environment -all from  ...  For a better viewing experience, the demo also adjusts the room's ambient light dimmers through ad-hoc discovery and control of home automation equipment.  ...  As shown in Figure 2 , our demo scenario includes an Android-based mobile device; an Art-Net light controller with attached light; and a DLNA-certified media renderer.  ... 
doi:10.1109/percomw.2013.6529505 dblp:conf/percom/CarlsonAS13 fatcat:jqu3rk3txzhqrlsm7ip75xw3cu

VeriUI

Dongtao Liu, Landon P. Cox
2014 Proceedings of the 15th Workshop on Mobile Computing Systems and Applications - HotMobile '14  
Unfortunately, today's mobile platforms provide weak protection for login credentials such as passwords.  ...  Acknowledgements We would like to thank our shepherd, Michael Piatek, and the anonymous reviewers for their helpful comments.  ...  Our work was supported by Intel through the ISTC for Secure Computing at UC-Berkeley as well as the National Science Foundation under NSF awards CNS-0747283 and CNS-0916649.  ... 
doi:10.1145/2565585.2565591 dblp:conf/wmcsa/LiuC14 fatcat:rqy2mmimifafde2a4sqhee5eam

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security [chapter]

Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga
2013 Lecture Notes in Computer Science  
URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required.  ...  We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applications without sacrificing functionality.  ...  We focuse on widely distributed plugins for Android.  ... 
doi:10.1007/978-3-642-38530-8_4 fatcat:oxlkx7uur5f7vftsnkbhiukoda

Social Semantic Network-Based Access Control [chapter]

Serena Villata, Luca Costabello, Fabien Gandon, Catherine Faron-Zucker, Michel Buffa
2013 Lecture Notes in Social Networks  
Second, we describe the Social Semantic SPARQL Security for Access Control vocabulary (S4AC 2 ), a lightweight ontology which allows to specify fine-grained access control policies for RDF data [44, 45  ...  Bob is using an Android tablet with touch display and he is not moving.  ... 
doi:10.1007/978-3-7091-0894-9_6 dblp:series/lnsn/VillataCGFB13 fatcat:v2mutdfmlzf4xofihqghhusbwy

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  In many cases, a capability system can be considered as a lightweight framework for SELinux with a focus on practicality and performance.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Self-Adaptive and Lightweight Real-Time Sleep Recognition With Smartphone

Ennio Gambi, Simone Barbetta, Adelmo De Santis, Manola Ricciuti
2018 Journal of Communications Software and Systems  
Such evidence stimulates the research of solutions to foster self-awareness of personal sleeping habits, and correct living environment management policies to encourage sleep.  ...  To this aim, we propose the implementation of a real-time sleep recognition methodology relied on a smartphone equipped with a mobile app that exploits contextual and usage information to infer sleep habits  ...  Samsung Health [15] , available for all Android mobile phones, is able to track the user activity, nutrition and sleep, and to provide health insights; this app may also allow a video chat with board-certified  ... 
doi:10.24138/jcomss.v14i3.584 fatcat:7hgcxdirz5annfyjgpsw6prkoe

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security.  ...  Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness.  ...  This was one of the schemes which adopted the dynamic policies, but contextual definitions were found to be static.  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

Marco Autili, Ivano Malavolta, Alexander Perucci, Gian Luca Scoccia, Roberto Verdecchia
2021 Journal of Internet Services and Applications  
The results of this study give a solid foundation for assessing existing and future approaches for static analysis of mobile apps, especially in terms of their industrial adoptability.Researchers and practitioners  ...  AbstractMobile platforms are rapidly and continuously changing, with support for new sensors, APIs, and programming abstractions.  ...  We established the need for performing a review on static analysis of mobile app (Section 3), we identified the main research questions (Section 4.1), and we defined the protocol to be followed by the  ... 
doi:10.1186/s13174-021-00134-x fatcat:mlzjbkdi7fhezisn3tcv7wzlbi

Securing SSL Certificate Verification through Dynamic Linking

Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R.B. Butler, Abdulrahman Alkhelaifi
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
CertShim imposes just 20 ms overhead for an SSL verification call, and hooks the SSL dependencies of 94% of Ubuntu's most popular packages with no changes necessary to existing applications.  ...  We introduce Cert-Shim, a lightweight retrofit to SSL implementations that protects against SSL vulnerabilities, including those surveyed by Georgiev et. al. [19], in a manner that is transparent to the  ...  Acknowledgments We would like to thank Paul van Oorschot, Jeremy Clark, Patrick Traynor, and Boyana Norris for their valuable comments and insight.  ... 
doi:10.1145/2660267.2660338 dblp:conf/ccs/BatesPNHTBA14 fatcat:5yo5la5n25ftflrisjgo3fkuce

A Security Monitoring Framework for Mobile Devices

António Lima, Luis Rosa, Tiago Cruz, Paulo Simões
2020 Electronics  
that was used for validation purposes.  ...  mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies.  ...  Funding: This work was partially funded by the "Mobilizador 5G" P2020 Project (project 10/SI/2016 024539) and FCT-Foundation for Science and Technology, I.P., within the scope of the project CISUC-UID/  ... 
doi:10.3390/electronics9081197 fatcat:q4fwmzetijcp3hvr5pkxpf3eny

FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing [article]

Shreshth Tuli, Redowan Mahmud, Shikhar Tuli, Rajkumar Buyya
2018 arXiv   pre-print
Because of its lightweight and cross platform software systems, it is easy to deploy, scalable and cost e_cient.  ...  FogBus offers a platform independent interface to IoT applications and computing instances for execution and interaction.  ...  Android Interface at Smart Phone Gateway An android executable named HealthKeeper launches the android interface to the prototype operator.  ... 
arXiv:1811.11978v1 fatcat:e4atctfkbre3hcunpdfdbexjw4

Privacy-Enhancing Context Authentication from Location-Sensitive Data [article]

Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas
2019 arXiv   pre-print
ConSec is implemented subsequently for the Android platform and evaluated using data collected from 35 users, which is followed by a security and privacy analysis.  ...  We demonstrate that LSH presents a useful approach for context authentication from location-sensitive data without directly utilising plain measurements.  ...  Murdoch, and Tom De Wasch-and the reviewers for providing many useful comments and suggestions towards improving this work.  ... 
arXiv:1904.08800v2 fatcat:mmlisv3nwzcnfpsabkkynbvs4m

A Multi-Armed Bandit-based Approach to Mobile Network Provider Selection [article]

Thomas Sandholm, Sayandev Mukherjee
2021 arXiv   pre-print
For the case where providers change prices synchronously, we approach the problem through contextual multi-armed bandits and Reinforcement Learning methods like Q-learning either applied directly to the  ...  bandit maximization problem or indirectly to approximate the Gittins indices that are known to yield the optimal provider selection policy.  ...  Significant work remains to be done on designing lightweight user agents for the restless multi-armed bandit.  ... 
arXiv:2012.04755v2 fatcat:pmoz6lrp3naabnkc5k73j52vx4
« Previous Showing results 1 — 15 out of 165 results