Filters








8 Hits in 5.7 sec

Android forensics: Automated data collection and reporting from a mobile device

Justin Grover
2013 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Physical access has been the traditional method for retrieving data useful to these investigations from Android devices, with the exception of some limited collection abilities in commercial mobile device  ...  The implementation of these devices on an enterprise can save on costs and add capabilities previously unavailable; however, the organizations that incorporate this technology must be prepared to mitigate  ...  Acknowledgements In addition to the thesis committee members, the author would like to thank the following people for reviewing this work:  ... 
doi:10.1016/j.diin.2013.06.002 fatcat:sgmz5w5rlncave2dmmipz2x34e

User experience with mobile security and privacy mechanisms

Lydia Kraus, Technische Universität Berlin, Technische Universität Berlin, Sebastian Möller
2017
By the help of two use cases – app permissions and screen locks with authentication – several quantitative studie [...]  ...  This thesis focuses especially on security and privacy mechanisms which are visible to the end-user and which involve actions by the end-user, such as app permissions and screen locks with authentication  ...  In each condition participants were presented with three kinds of apps in randomized order.  ... 
doi:10.14279/depositonce-6029 fatcat:4ss3l7be35gvdm74xw2ar36ktu

Mining Sandboxes [article]

Konrad Jamrozik, Universität Des Saarlandes, Universität Des Saarlandes
2018
Our BOXMATE prototype for Android applications shows the approach is technically feasible, has an easy setup process, and is widely applicable to existing apps.  ...  As a consequence, backdoors, advanced persistent threats and other kinds of attacks based on the passage of time become exceedingly hard to conduct covertly.  ...  Also, in the time span, multiple apps from the same category might have been in the top 1 spot. If this was the case, we have chosen one from those apps at random.  ... 
doi:10.22028/d291-27390 fatcat:w7mkmpwhenelnafc4s3myxbcum

On Several Problems Regarding the Application of Opportunistic Proximate Links in Smartphone Networks [article]

Wei Peng, IUPUI University Library, IUPUI # Defaults To Publisher, Feng Li, Xukai Zou, Ninghui Li
2016
Chapter 4 is on the use of opportunistic proximate links in a generalized scenario of content distribution in a smartphone network that is heterogeneous in the availability of cellular persistent infrastructural  ...  Chapter 2 is on the use of opportunistic proximate links in selecting a representative subset from a set of smartphones for prioritized defense deployment in a Bring-Your-Own-Device (BYOD) enterprise network  ...  The rest of the chapter presents an approach that addresses these aspects in the task of identifying/explaining Android app similarity in specific, and of Android app analysis in general.  ... 
doi:10.7912/c2/2311 fatcat:jelytjon5vdd3cn2mrtknkbxgu

Challenges in using cryptography - End-user and developer perspectives

Christian Stransky, Technische Informationsbibliothek (TIB)
2022
encryption and signing is hardly used even in an institution with its own certificate authority.  ...  In this dissertation, I investigated how to support researchers in conducting research with developers; I established that usability is one of the major factors in allowing developers to implement the  ...  In 2012, Fahl et al. published the paper "Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security", where they evaluated apps on the Android Play Store and found that many apps were vulnerable  ... 
doi:10.15488/12107 fatcat:t44vormnhbg2ld6qfljtvu4cmm

Perceived security and usage of a mobile payment application [article]

Hanul Sieger, Technische Universität Berlin, Technische Universität Berlin, Sebastian Möller
2015
The results of the experiments revealed relevant factors, which show an impact on perceived security and usage.  ...  The security method used with the mobile payment app was varied (no security, PIN, fingerprint recognition) and "attacks" were simulated on the payment methods.  ...  using an SMS-based closedloop payment system.  ... 
doi:10.14279/depositonce-4804 fatcat:kaanbvj3pjanfpnoznwd5rholm

eHealth and mHealth Pipelines for Clinical Decision Support to Improve Medication Selection and Safety

Tibor W Van Rooij
2015
The main problem with uptake and implementation centres on an absence of computational infrastructures to deliver an individualized approach at the point of care.  ...  selection on a country-specific basis, and developing a work-frame template (BOW) to build clinical decision applications (apps) for smartphones and tablets.  ...  This figure demonstrates the clinical interface of our test-case app on an Android platform.  ... 
doi:10.7939/r3nz8119n fatcat:6ouoyiwxrnes3e6nz2xi5fjyvu

Machine Learning and its Application in IoT

Sai Vamsi Kolla
2021
Analysis of IoT Protocols, various frameworks, challenges of IoT and Machine learning technologies are covered in the five chapters.  ...  In the progress of this project, a massive investment of time was made. Various influential people gave the project their time and resources. I thank them for their guidance. I thank Mr.  ...  We have lightweight M2M, in which the functionality is built on top of collapse running over DTS UDP or an SMS bear. The object model defines resources that can be multiple instances of an object.  ... 
doi:10.7939/r3-8821-xt93 fatcat:3ritef5u6raddcetphudx7xmoq