Filters








15,560 Hits in 5.8 sec

Safe Execution of Dynamically Loaded Code on Mobile Phones [chapter]

Glen Pink, Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfeld, Rainer Wasinger
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This paper describes DCEF (Dynamic Code Execution Framework), a framework which allows applications to securely execute dynamically loaded code, providing new functionality such as client-side personalisation  ...  DCEF ensures the user's personal information remains safe while executing code from potentially untrusted sources.  ...  Our framework aims to ensure security for client-side personalisation and other facilities that can be supported by dynamically loaded code on mobile phones.  ... 
doi:10.1007/978-3-642-29154-8_1 fatcat:jicpkunmrfamtdm6xjxwwgcpha

Android Ransomware and Its Detection Methods

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Mobile phones are used not only for communication purpose but users also store their personal data and many other things in their mobile phone. 80% to 87% mobile phones are using Android operating system  ...  There are different approaches like static, dynamic and hybrid which are used to detect ransomware.  ...  MARVIN [21] is used to analyze malware and for solving problems like obfuscation and dynamic code loading. This method is based on hybrid approach.  ... 
doi:10.35940/ijitee.d1632.029420 fatcat:yae5gaz3kzfe3i5rvzubzmni4y

Using Satellite Execution to Reduce Latency for Mobile/Cloud Applications [chapter]

Robert Pettersen, Steffen Viken Valvåg, Åge Kvalnes, Dag Johansen
2016 Communications in Computer and Information Science  
We provide a programming abstraction for location-independent code, which has the potential to execute either locally or at a satellite execution environment in the cloud, where other cloud services can  ...  We demonstrate a practical way to reduce latency for mobile .NET applications that interact with cloud services, without disrupting application architectures.  ...  Acknowledgements This work is part of the Information Access Disruptions (iAD) project, supported in part by the Research Council of Norway through the National Center for Research-based Innovation program  ... 
doi:10.1007/978-3-319-29582-4_15 fatcat:sswb7msczncbnnzmunaagulp7a

Towards self-healing smartphone software via automated patching

Md. Tanzirul Azim, Iulian Neamtiu, Lisa M. Marvel
2014 Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14  
In the detection stage, our system dynamically analyzes app execution to detect certain exceptional situations.  ...  Our approach does not require access to app source code or any system (e.g., kernel-level) modification.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1145/2642937.2642955 dblp:conf/kbse/AzimNM14 fatcat:4hdsy7qmr5c75cj4ackvs5vjey

Survey on Mobile Malware Analysis and Detection

K Swetha, K V.D.Kiran
2018 International Journal of Engineering & Technology  
The amazing advances of mobile phones enable their wide utilize. Since mobiles are joined with pariah applications, bundles of security and insurance issues are incited.  ...  The work mainly focuses on different classification algorithms which are used as a part of dynamic malware detection on android.  ...  In the meantime of quick development of versatile applications, mobile malware has evolved drastically. Mobile malware is a malevolent program focusing on cell phones.  ... 
doi:10.14419/ijet.v7i2.32.15584 fatcat:sehu4yjgl5ddtcs3o7z6s4kuha

Demo

Fernando Siqueira, Angelo Brayner
2005 Proceedings of the 6th international conference on Mobile data management - MEM '05  
This paper presents the MDBA (Mobile Data Base Administrator), a context-aware tool for remote data base administration that is executed in mobile devices.  ...  Increasingly advances in mobile computing are allowing development of the applications for ubiquitous computing environment.  ...  The MDBA engine layer consists of a remote application installed in the mobile device and executed on Java Virtual Machine (JVM).  ... 
doi:10.1145/1071246.1071300 dblp:conf/mdm/SiqueiraB05 fatcat:mvbbuaze75ao5gkma3legvtiku

Runtime monitoring for next generation Java ME platform

Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter
2010 Computers & security  
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on.  ...  These applications perform some operations on the mobile device, that are critical from the security point of view, such as connecting to the Internet, sending and receiving SMS messages, connecting to  ...  Proof carrying code (PCC) enables safe execution of code from untrusted sources by requiring a producer to furnish a proof regarding the safety of mobile code.  ... 
doi:10.1016/j.cose.2009.07.005 fatcat:oiefxxf3ungtjovj2ffa562eoi

Malware Defense in Mobile Network using Dynamic Analysis of Android Application

Ashwini A
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
I am proposing an android application which is able to perform dynamic analysis on android program.  ...  As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users.  ...  Also they design and execute a horizontal study of smart phone applications based on static analysis of 21 million lines of recovered code.  ... 
doi:10.17762/ijritcc2321-8169.1503159 fatcat:6oe5jmwd2rhs5c7ilcapkeosya

Measuring integrity on mobile phone systems

Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger
2008 Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08  
Mobile phone security is a relatively new field that is gathering momentum in the wake of rapid advancements in phone system technology.  ...  Mobile phones are now becoming sophisticated smart phones that provide services beyond basic telephony, such as supporting third-party applications.  ...  Also, we measure the mapping between the code loaded and the trusted subject in which the code is loaded, so the remote party can verify that the expected code is executed for the subject.  ... 
doi:10.1145/1377836.1377862 dblp:conf/sacmat/MuthukumaranSSJJ08 fatcat:qduu7soejbcexlyj5zxjs4klom

Energy Efficient Load Balancing Strategy for Mobile Cloud Computing

Karanbir Singh
2015 International Journal of Computer Applications  
Mobile Cloud Computing combines cloud computing and mobile computing. It has turned into one of the business trendy expressions and a real exchange string in the IT world.  ...  In this paper, a new algorithm is proposed load balancing for mobile clouds has been presented.  ...  The jobs are executed based on dynamic selection and enter in to cloud environment.  ... 
doi:10.5120/ijca2015907553 fatcat:2rzg2e52fjbrvl5baw5xcdti2u

Fast dynamic execution offloading for efficient mobile cloud computing

Seungjun Yang, Yongin Kwon, Yeongpil Cho, Hayoon Yi, Donghyun Kwon, Jonghee Youn, Yunheung Paek
2013 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)  
In execution offloading, code regions to be executed on the server are decided statically or dynamically based on the complex analysis on execution time and process state transfer time of every region.  ...  of our mobile cloud computing significantly in terms of execution time and power consumption.  ...  Our work is in fact based on the original work of CloneCloud [5] , which dynamically offloads part of Android Dalvik code running on a smartphone to the cloud.  ... 
doi:10.1109/percom.2013.6526710 dblp:conf/percom/YangKCYKYP13 fatcat:vzvqny6t7fb5xh4twgwge2qy7e

F5N: Nanopore Sequence Analysis Toolkit for Android Smartphones [article]

Hiruna Samarakoon, Sanoj Punchihewa, Anjana Senanayake, Roshan Ragel, Hasindu Gamaarachchi
2020 bioRxiv   pre-print
On NA12878 nanopore data, F5N can perform a complete methylation calling pipeline on a mobile phone in ∼15 minutes for a batch of 4000 nanopore reads (∼34 megabases).  ...  AbstractF5N is the first ever Android application for nanopore sequence analysis on a mobile phone, comprised of popular tools for read alignment (Minimap2), sequence data manipulation (Samtools) and methylation  ...  Batches of reads were assigned on to all four mobile phones and were processed in parallel.  ... 
doi:10.1101/2020.03.22.002030 fatcat:odzqyg6zcvby3ctztav6z6x3ma

A Survey on Android Malware Detection Techniques

Rubata RIASAT, Muntaha SAKEENA, Chong WANG, Abdul Hannan SADIQ, Yong-ji WANG
2017 DEStech Transactions on Computer Science and Engineering  
To overcome these issues and to keep the smartphones safe a number of malicious applications, malware threat and adwares for mobile phones is expected to increase with the functionality enhancement of  ...  smart mobile phone.  ...  Acknowledgement This research was financially supported by the National Natural Science Foundation of China (61170072) and the National Science Foundation for Young Scientists of China under Grant (61303057  ... 
doi:10.12783/dtcse/wcne2016/5088 fatcat:umen353condztdgf77w4agvngq

Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi
2012 Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12  
, such as the user's call logs, phone number, browser bookmarks, or even the list of apps installed on the phone.  ...  The developers of these apps benefit financially, either by selling their apps directly or by embedding one of the many ad libraries available on smartphone platforms.  ...  The dynamic code loading apparently becomes the choice at the cost of raising privacy and security concerns to mobile users.  ... 
doi:10.1145/2185448.2185464 dblp:conf/wisec/GraceZJS12 fatcat:6exnyyi5g5dnxdbcanka5lcgha

Design and Implementation of Mobile Data Security Service Platform Oriented to Specific Domains

KUN LIU, PENG SUN, KAIQI ZHAO
2017 DEStech Transactions on Computer Science and Engineering  
Afterwards, based on the unified Android App store, a set of safe and oriented security data service platform is thus formed, on which the data security can be guaranteed from the aspects of authentication  ...  This paper focuses on the study and analysis of the mobile data security service platform that is oriented to specific industries.  ...  On such basis, it is essential to have a certain understanding of dynamic loading technique, mainly DexClassLoader of Android.  ... 
doi:10.12783/dtcse/aiea2017/15022 fatcat:vwncj7gtazbm7oyq6r5kfzyky4
« Previous Showing results 1 — 15 out of 15,560 results