Filters








5,451 Hits in 6.0 sec

Security Issues in the Android Cross-Layer Architecture [article]

Alessandro Armando, Alessio Merlo, Luca Verderame
<span title="2012-09-04">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We used the proposed model to carry out an empirical assessment of some flows within the Android cross-layered architecture.  ...  Our experiments indicate that little control is exercised by the Android Security Framework (ASF) over cross-layer interactions in Android.  ...  Security in Android is granted by a set of cross-layers security mechanisms that collectively constitute the Android Security Framework (ASF).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1209.0687v1">arXiv:1209.0687v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ph6oawwvfcfjf4yp25ijtdpra">fatcat:2ph6oawwvfcfjf4yp25ijtdpra</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1209.0687/1209.0687.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1209.0687v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Deep-Net: Deep Neural Network for Cyber Security Use Cases [article]

Vinayakumar R and Barathi Ganesh HB and Prabaharan Poornachandran and Anand Kumar M and Soman KP
<span title="2018-12-09">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud detection.  ...  Experiments of DNN performed well in comparison to the classical machine learning algorithms in all cases of experiments of cyber security use cases.  ...  Acknowledgement This research was supported in part by Paramount Computer Systems. We are also grateful to NVIDIA India, for the GPU hardware support to research grant.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1812.03519v1">arXiv:1812.03519v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ujvoi2xxdrdmpfbdprfnkkzqzq">fatcat:ujvoi2xxdrdmpfbdprfnkkzqzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200830002651/https://arxiv.org/ftp/arxiv/papers/1812/1812.03519.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/e4/5de46094908776e2a4f599fb5cdae089fd1836e2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1812.03519v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Comparison of Concurrent Mobile OS Characteristics.pdf

Soham Bhattacharya
<span title="2020-03-11">2020</span> <i title="figshare"> Figshare </i> &nbsp;
Current results after comparison with earlier study found that many mobile devices and features became obsolete in a short time span supporting the aggressive growth of mobileindustry.  ...  This paper compares between the currently available mobile devices based on its user interface, security, memory utilization, processor, and device architecture.The mobile products launched from 2015-19  ...  specific security issues outside of the normal release update cadence.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.11968221.v1">doi:10.6084/m9.figshare.11968221.v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kv25wrcehbfq5b3zb2yf3nqlky">fatcat:kv25wrcehbfq5b3zb2yf3nqlky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200312084731/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/21975111/ComparisonofConcurrentMobileOSCharacteristics.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/da/7fda4b4faa667fe86fb6add1ce46e614d4441cab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.11968221.v1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>

Penetration Testing for Android Smartphones

Okolie C.C
<span title="">2013</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
In this paper, an attempt was made to test and analyze the security architecture of the Android operating system using the latest penetration testing and vulnerability tool based on Kali Linux.  ...  The result shows that although there is an improvement in the security stack of the different AndroidVersions but Version 4.2 is more secured than the others.  ...  Each layer in the architecture provides different services to the layer just above it [12] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-143104109">doi:10.9790/0661-143104109</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nnnntl7zcjfpfmbty7ktgx3qbm">fatcat:nnnntl7zcjfpfmbty7ktgx3qbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602124813/http://www.iosrjournals.org/iosr-jce/papers/Vol14-issue3/P0143104109.pdf?id=7444" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/b3/62b39df4600b25692a9e2be1413f3b1f7e307034.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-143104109"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

Poonam N.Railkar, Parikshit N. Mahalle
<span title="2013-05-31">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
At the end this paper also discusses mitigation techniques to address few of the mentioned attacks. General Terms Security, Attacks.  ...  Equally being an Android operating system as open source, it is prone to attack. In this view there is need to define new attack taxonomy and its modeling.  ...  As shown in figure 6 , Cross-service attack occurs because the service architecture of Smartphone allows attacker to cross service boundaries.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/12224-8462">doi:10.5120/12224-8462</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6cg6xrrcvjccxelw7ugc27xg4q">fatcat:6cg6xrrcvjccxelw7ugc27xg4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722133450/https://research.ijcaonline.org/volume70/number25/pxc3888462.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/d6/d5d62808e35b809ee672860330661c68e54e9f72.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/12224-8462"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

An Empirical Evaluation of the Android Security Framework [chapter]

Alessandro Armando, Alessio Merlo, Luca Verderame
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a> </i> &nbsp;
A number of recently discovered vulnerabilities suggests that some security issues may be hidden in the interplay between the Java stack and the Linux kernel.  ...  We have conducted an empirical security evaluation of the interaction among layers.  ...  Security in Android is granted by a set of cross-layers security solutions combining basic Linux security mechanisms (e.g.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-39218-4_14">doi:10.1007/978-3-642-39218-4_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xojlu73os5b4tecebrtvgbr4he">fatcat:xojlu73os5b4tecebrtvgbr4he</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170820161737/https://link.springer.com/content/pdf/10.1007%2F978-3-642-39218-4_14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/39/eb39b80f62df98c52cbfe251825dc42fdc95ecd2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-39218-4_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark [article]

Flor Álvarez, Max Kolhagen, Matthias Hollick
<span title="2018-08-14">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
As a proof of concept, we implement SoL in the Android platform and hence test its feasibility on real mobile devices. We further evaluate its key performance aspects using simulation.  ...  Furthermore, they support neither cross-application on mobile devices nor strong protection of key material using hardware security modules.  ...  ACKNOWLEDGMENT This work has been funded by the German Federal Ministry for Education and Research (BMBF) within the SMARTER project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1808.04671v1">arXiv:1808.04671v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t2iisnthzzbafccnonyit56ke4">fatcat:t2iisnthzzbafccnonyit56ke4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191014004743/https://arxiv.org/pdf/1808.04671v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9e/84/9e849acd13be1b400dc0f5894b90fc15b795319a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1808.04671v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Surveying Smartphone Security for Linux Powered Devices

Sharan Shetty
<span title="2016-08-20">2016</span> <i title="Valley International"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7itxqhdltnewtn4ueymnlhnkea" style="color: black;">International Journal Of Engineering And Computer Science</a> </i> &nbsp;
In this era  ...  Phalke, for her guidance, ideas, help, encouragement, interpretations and suggestions which helped us in the realization of our objective and coordinate as a team. We wish to thank Ms.  ...  Rahul Pawar for their constant support which helped bring the best out of our survey.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18535/ijecs/v4i11.23">doi:10.18535/ijecs/v4i11.23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4slfzwnpmbci3mtf5pnb3d55g4">fatcat:4slfzwnpmbci3mtf5pnb3d55g4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602065728/http://ijecs.in/issue/v4-i11/23%20ijecs.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/38/b43890d194edd4628a26910a24ee2204c0bd0172.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18535/ijecs/v4i11.23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cross-layer real-time support for JVM-based smartphone systems

Young Joo Woo, Jungwook Cho, Donghyouk Lim, Euiseong Seo
<span title="">2012</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nke6yprngzgvnobfpjkzmognci" style="color: black;">2012 IEEE International Conference on Consumer Electronics (ICCE)</a> </i> &nbsp;
This research proposes a cross-layer real-time support by which applications notify operating systems about their timeliness requirements.  ...  Our prototype shows significant improvements in the response times and throughputs of prioritized applications.  ...  We resolve this issue by proposing a cross-layer real-time support framework. The proposed framework is apparently a Java library.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icce.2012.6162031">doi:10.1109/icce.2012.6162031</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iccel/WooCLS12.html">dblp:conf/iccel/WooCLS12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tfovograrrcdjiz3nywvizxvya">fatcat:tfovograrrcdjiz3nywvizxvya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809015127/http://csl.skku.edu/papers/icce12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/45/5c45f523e2cd04abe441fc6ab3ea68b076e4ef03.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icce.2012.6162031"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Critical Evaluation of Vulnerabilities in Android OS: (Forensic Approach)

Buthaina Mohammed
<span title="2015-11-17">2015</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
The purpose of this paper is to explore the most significant security threats and vulnerabilities in the Android Operating System.  ...  The open nature of the Android platform attracts attackers to do different types of criminal activities.  ...  The highest layer in the Android Architecture is the Application layer and the lowest layer is the Linux Kernel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015907005">doi:10.5120/ijca2015907005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4czz7k4hgnfcneh4fmf3yc6pfy">fatcat:4czz7k4hgnfcneh4fmf3yc6pfy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604102840/https://www.ijcaonline.org/research/volume130/number5/alzadjali-2015-ijca-907005.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/32/bd32e49ab8a1fbbf2419a8962dfa788f36769813.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015907005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Dynamic Robust DL-based Model for Android Malware Detection

Ikram Ul Haq, Tamim Ahmed Khan, Adnan Akhunzada
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Further, it passes this information to its lower layer in hybrid architecture. A detailed CNN architecture is presented in [35] .  ...  In this paper, the authors proposed a hybrid malware detection model to tackle this indispensable security concern in all Android-based applications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3079370">doi:10.1109/access.2021.3079370</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5dq4wu4vqzhhjmmb7y76eqc3fq">fatcat:5dq4wu4vqzhhjmmb7y76eqc3fq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210517063723/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09430613.pdf?tp=&amp;arnumber=9430613&amp;isnumber=6514899&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/42/c1/42c19a78cf86af5727e0681a2d1f1a9ceb4857a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3079370"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Deep Learning Based Android Anomaly Detection Using a Combination of Vulnerabilities Dataset

Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Ahmed Bali, Alvine Boaye Belle
<span title="2021-08-17">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
Although several approaches have been proposed in the research literature for the detection of Android malwares, many of them suffer from issues such as small training datasets, there are few features  ...  As the leading mobile phone operating system, Android is an attractive target for malicious applications trying to exploit the system's security vulnerabilities.  ...  The use of machine learning to handle security vulnerabilities is similar to their approach. However, we have chosen to concentrate on Android platform security issues rather than other platforms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11167538">doi:10.3390/app11167538</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/smsvslcccveypd2mtyozou6pzq">fatcat:smsvslcccveypd2mtyozou6pzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211210060637/https://mdpi-res.com/d_attachment/applsci/applsci-11-07538/article_deploy/applsci-11-07538.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/e0/c3e0e8cb67f9ccaf7cf8cd1a0f8da927a0d767c7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11167538"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

A Survey on Mobile Applications for Smart Agriculture

Isaac Nyabisa Oteyo, Matteo Marra, Stephen Kimani, Wolfgang De Meuter, Elisa Gonzalez Boix
<span title="2021-05-24">2021</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yzo2wjv2bbh2zo3zo5p7scalee" style="color: black;">SN Computer Science</a> </i> &nbsp;
The increasing global demand for food and nutrition security has raised the need to automate processes in modern farming.  ...  The survey results show that SAAs in general (1) follow different architectural models, (2) are targeted for different mobile platforms, and (3) satisfy different software engineering issues.  ...  Acknowledgements This work is supported by the Legumes Centre for Food and Nutrition Security (LCEFoNS) programme which is funded by VLIR-UOS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s42979-021-00700-x">doi:10.1007/s42979-021-00700-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hnhsq2uq7fcrpcx7t36yijimu4">fatcat:hnhsq2uq7fcrpcx7t36yijimu4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718055150/https://link.springer.com/content/pdf/10.1007/s42979-021-00700-x.pdf?error=cookies_not_supported&amp;code=9620d8ac-97fb-420c-816f-c7e894eedaaf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/1b/dd1b3e3ee3f7da50387c144da6c3067ccbd98ec5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s42979-021-00700-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The Transitivity of Trust Problem in the Interaction of Android Applications [article]

Steffen Bartsch and Karsten Sohr and Michaela Bunke and Oliver Hofrichter and Bernhard Berger
<span title="2012-04-06">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We demonstrate the feasibility of our approach with Android applications, although the generalization of the analysis to similar composition-based architectures, such as Service-oriented Architecture,  ...  can also be explored in the future.  ...  Another research approach is the SAINT architecture [39] . It inserts enforcement hooks into Android's middleware layer to improve the currently limited Android security architecture.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1204.1458v1">arXiv:1204.1458v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ugbmbbqgb5gm3a2mlgfdej6lbm">fatcat:ugbmbbqgb5gm3a2mlgfdej6lbm</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1204.1458/1204.1458.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1204.1458v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Ubiquitous computing and android

Zohaib Sibte Hassan
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cfe4lhdfyfbp3gjse7ana745ci" style="color: black;">2008 Third International Conference on Digital Information Management</a> </i> &nbsp;
This paper also discusses various features of Android operating system in the light of the ubiquitous system requirements.  ...  It also highlights how Android fulfills the subject requirements and considerations.  ...  Figure 1 : 1 Android Operating System Architecture In middle-ware, libraries like OpenGL ES, SGL, Surface Manager, and Free Type provide a crossplatform layer that is only dependent on the LINUX layer  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdim.2008.4746751">doi:10.1109/icdim.2008.4746751</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icdim/Hassan08.html">dblp:conf/icdim/Hassan08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5kexaneokbdp5g762hu27qyb5y">fatcat:5kexaneokbdp5g762hu27qyb5y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809024622/http://kowon.dongseo.ac.kr/~htlim/online/courses/Fall-2012/grad_swproj/PaperList/Ubiquitous%20Computing%20and%20Android.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/33/ee33829391ac39a14268f1b89333c6c190ebab9c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdim.2008.4746751"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 5,451 results