Journal articles on the topic 'Android system security'

To see the other types of publications on this topic, follow the link: Android system security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Android system security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jadhav, Atul Chandrakant, and Sunil P. Khachane. "AntiRIG Security System in Android." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 6 (June 30, 2017): 346–49. http://dx.doi.org/10.23956/ijarcsse/v7i6/0261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Han, So-Ra, and Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.

Full text
Abstract:
<p>As the core component of Android framework, Android system services provide a large number of basic and core function services for Android system. It has a lot of resources and very high system permissions. And for the Android system, it is a very important attack surface. Attackers can use Android system service vulnerabilities to steal user privacy, cause Android applications or Android system denial of service, remote malicious code execution and other malicious behaviors, which will seriously affect the security of Android users. Based on fuzzy testing technology, this paper designed and implemented a vulnerability mining system for Android system services, optimized and improved the fuzzy testing method, so as to improve the speed and effectiveness of vulnerability mining, and timely submitted the discovered vulnerabilities to the corresponding manufacturers and security agencies, to help Android manufacturers repair the vulnerabilities in time. The main work of this paper is as follows: Aiming at the null pointer reference vulnerability of Android system services, we designed and implemented an automatic fast mining system FASSFuzzer. FASSFuzzer uses ADB to quickly detect null pointer reference vulnerabilities in Android services. At the same time, FASSFuzzer added automatic design to automatically perceive the generation of vulnerabilities and ensure the full automation of the whole vulnerability mining process, and automatically generate a vulnerability mining report after the completion of vulnerability mining.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.

Full text
Abstract:
<p>As the core component of Android framework, Android system services provide a large number of basic and core function services for Android system. It has a lot of resources and very high system permissions. And for the Android system, it is a very important attack surface. Attackers can use Android system service vulnerabilities to steal user privacy, cause Android applications or Android system denial of service, remote malicious code execution and other malicious behaviors, which will seriously affect the security of Android users. Based on fuzzy testing technology, this paper designed and implemented a vulnerability mining system for Android system services, optimized and improved the fuzzy testing method, so as to improve the speed and effectiveness of vulnerability mining, and timely submitted the discovered vulnerabilities to the corresponding manufacturers and security agencies, to help Android manufacturers repair the vulnerabilities in time. The main work of this paper is as follows: Aiming at the null pointer reference vulnerability of Android system services, we designed and implemented an automatic fast mining system FASSFuzzer. FASSFuzzer uses ADB to quickly detect null pointer reference vulnerabilities in Android services. At the same time, FASSFuzzer added automatic design to automatically perceive the generation of vulnerabilities and ensure the full automation of the whole vulnerability mining process, and automatically generate a vulnerability mining report after the completion of vulnerability mining.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Marpaung, Ruth Shyintia Rouli. "Android Based Door Security Design." Brilliance: Research of Artificial Intelligence 2, no. 1 (June 1, 2022): 26–30. http://dx.doi.org/10.47709/brilliance.v2i1.1535.

Full text
Abstract:
Room insecurity such as cases of theft or fire can occur, especially in rooms that are not equipped with special security and guard systems. Based on this, it is necessary to develop a security system that can be accessed and monitored remotely and provides early warning of early indications of danger using smartphones. System development is carried out through the stages of making software and hardware. The hardware consists of Arduino Mega 2560 to manage the system, MySQL Database Server, CC3000 Wifi Shield as a communication device between Arduino and the server, Limit Switch to detect a forced push on the door, MQ-2 measuring gas leaks in the room, DHT-11 sensor to measure the room temperature, VC0706 camera to capture images in the door area. Android application as a system interface to change lock status and monitor room conditions. A warning notification of the danger indication of a gas leak is sent to the user's smartphone by displaying the value of the gas content. The warning message of a forced push on the door is equipped with a feature to display camera captures. The final result of this research is that a room security system has been successfully created where access to door locks and room monitoring can be done through an android application installed on a smartphone. The system can provide a hazard warning message well. The warning message of a forced push on the door is equipped with a feature to display camera captures. The final result of this research is that a room security system has been successfully created where access to door locks and room monitoring can be done through an android application installed on a smartphone. The system can provide a hazard warning message well. The warning message of a forced push on the door is equipped with a feature to display camera captures. The final result of this research is that a room security system has been successfully created where access to door locks and room monitoring can be done through an android application installed on a smartphone. The system can provide a hazard warning message well.
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Jae-Kyung, and Sang-Yong Choi. "Studying Security Weaknesses of Android System." International Journal of Security and Its Applications 9, no. 3 (March 31, 2015): 7–12. http://dx.doi.org/10.14257/ijsia.2015.9.3.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.

Full text
Abstract:
Android system has been one of the main targets of hacker attacks for a long time. At present, it is faced with security risks such as privilege escalation attacks, image tampering, and malicious programs. In view of the above risks, the current detection of the application layer can no longer guarantee the security of the Android system. The security of mobile terminals needs to be fully protected from the bottom to the top, and the consistency test of the hardware system is realized from the hardware layer of the terminal. However, there is not a complete set of security measures to ensure the reliability and integrity of the Android system at present. Therefore, from the perspective of trusted computing, this paper proposes and implements a trusted static measurement method of the Android system based on TrustZone to protect the integrity of the system layer and provide a trusted underlying environment for the detection of the Android application layer. This paper analyzes from two aspects of security and efficiency. The experimental results show that this method can detect the Android system layer privilege escalation attack and discover the rootkit that breaks the integrity of the Android kernel in time during the startup process, and the performance loss of this method is within the acceptable range.
APA, Harvard, Vancouver, ISO, and other styles
8

Fadjar Bastari, Winarno, and Muhammad Andri Eko Prasetyo. "Locker Security System Design Based On Internet of Things (IoT) Android Interface." BEST : Journal of Applied Electrical, Science, & Technology 3, no. 2 (September 15, 2021): 30–35. http://dx.doi.org/10.36456/best.vol3.no2.4323.

Full text
Abstract:
Technological sophistication is growing in various ways, for example in the security system of an object. Basically, the security system of an object is done manually which is less practical than today's technological systems. One application of the security system is for locker safety. Therefore, to overcome the security system in the locker, the solution is to create a security system that uses ESP32-CAM as an Internet of Things (IoT) android-based microcontroller for the android interface for the security system in the locker and when someone forcibly opens the ESP32-CAM module it will take a photo. the person to notify the user about the current state of the locker via the telegram application on android.
APA, Harvard, Vancouver, ISO, and other styles
9

Zulfian Wathoni, Khairunazri, and Muh. Fahrurrozi. "Motorcycle Safety System With Android Based Arduino." TEKNIMEDIA: Teknologi Informasi dan Multimedia 1, no. 2 (January 5, 2021): 57–63. http://dx.doi.org/10.46764/teknimedia.v1i2.26.

Full text
Abstract:
Motorcycle security systems today still use manual locks that are easily damaged by thieves in seconds. Although there are several motorbike manufacturers that have used Shutter Key Magnets, in fact, this security is not efficient for security because it is prone to damage using only the T key. In this digital era, many new security systems are safer than manual locks. Therefore, the idea of ​​designing This tool the author uses Ar-duinoUno and Smartphone as controllers in starting a motorcycle easily. For example a computer-based security system.
APA, Harvard, Vancouver, ISO, and other styles
10

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.

Full text
Abstract:
This paper designs a web-based Android supervisory control system. Android controller is used as a local controller to fit into a supervisory control framework. The framework includes a central server, a SMS device attached to the server, multiple local controllers, a remote control program and a ladder logic computer-aided design program. The Android controller contains an Android mobile phone, a Wi-Fi wireless access point, a switch hut (or NAT) and multiple data acquisition modules. The Android mobile phone enters TCP/IP LAN through the Wi-Fi access point. The data acquisition modules with TCP/IP interface are plugged into the LAN, and read/written by the Android mobile phone with Modbus TCP. The Android controller communicates with supervisory server with a specific m2m protocol which is based on http protocol. Once an Android controller is connected to the supervisory control framework, it can be monitored and controlled remotely with any browser. A web-based home security system is constructed to demonstrate the usage of the web-based Android supervisory control system. The control laws for the home security system are partially implemented with ladder logics designed with a computer-aided program in the framework. With a supervisory server serving multiple Android controllers, Cloud home security service is formed.
APA, Harvard, Vancouver, ISO, and other styles
11

Jadhav, Supriya K. "Android based Advance Anti-Theft Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 27, 2017): 663–68. http://dx.doi.org/10.22214/ijraset.2017.3124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Reza Khan, Sadeque, and Farzana Sultana Dristy. "Android Based Security and Home Automation System." International Journal of Ambient Systems and Applications 3, no. 1 (March 31, 2015): 15–24. http://dx.doi.org/10.5121/ijasa.2014.3102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hendri, Hendri, and Rosyinta Rosyinta. "Suitcase Security System Using Android and GPS." Jurnal Pendidikan Teknologi Kejuruan 5, no. 4 (December 10, 2022): 127–32. http://dx.doi.org/10.24036/jptk.v5i4.32423.

Full text
Abstract:
Technological progress is something that cannot be avoided in line with the development of science. Technology provides many benefits because technology is present to facilitate human work. One of the technological advances is the presence of airplanes. To go wherever humans are not restricted by distance and time. Generally, people will use a suitcase to store their luggage when they travel because it is easier to carry. But the theft of items in the suitcase is rampant. For this reason, a security system can be made that can inform the owner that the suitcase has been forcibly opened. The PIR sensor installed in the suitcase will detect if there is movement and temperature of the human body heat in the suitcase. Then GSM SIM900A will send a notification to the owner and the buzzer will sound. If the suitcase has been stolen and taken away then we can see the location of the suitcase in the application that has been made with coordinates obtained from the GPS module installed in the suitcase. In addition, we can activate or deactivate the sensor through an application that has been made with the aim that when the owner opens the suitcase there will be no notification that the suitcase has been forced open and the buzzer will not ring.
APA, Harvard, Vancouver, ISO, and other styles
14

Mayrhofer, René, Jeffrey Vander Stoep, Chad Brubaker, and Nick Kralevich. "The Android Platform Security Model." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–35. http://dx.doi.org/10.1145/3448609.

Full text
Abstract:
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This article aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model.
APA, Harvard, Vancouver, ISO, and other styles
15

McVearry, Kenneth A. "DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield." Military Medicine 188, Supplement_6 (November 1, 2023): 192–98. http://dx.doi.org/10.1093/milmed/usad084.

Full text
Abstract:
ABSTRACT Introduction Apps that support telemedicine on the battlefield typically run on classified devices and transmit information over classified networks, whereas the medical data the apps create and transmit are unclassified. Current systems treat these data as classified, so a cross-domain solution is required to transfer the data back to an unclassified domain, which adds delays and costs to the process of transmitting critical data needed to treat injured warfighters. To address this gap, ATC-NY developed DroidChamber, which is a software-based Android system that enables multilevel security and which runs on smartphones and tablets. DroidChamber enables warfighters to execute apps in multiple security domains without risking information leakage. Materials and Methods DroidChamber v6 is a collection of mobile device management and security containerization technologies targeting Android 6, and it applies these technologies by leveraging Linux kernel operating-system-level virtualization technologies. DroidChamber v10 takes advantage of Android Work Profiles and Samsung’s Knox technology in Android 10, which provides the ability to provision separate “work” and “personal” profiles that securely isolate applications; apps within each profile can further be isolated through the built-in Android controls and the Knox Application Policy. Results DroidChamber is a software-based Android system, so it requires no added hardware to be attached or integrated with an end-user device. DroidChamber’s innovation is isolation of specific Android app resources (e.g., networking) enforced with fine-grained security policies. With DroidChamber, a medic can connect their device to different security domains, giving a wider range of access to medical information in a tactical environment. Conclusions DroidChamber improves telemedicine applications by enabling the warfighter to share information without requiring a cross-domain guard that may erroneously block some data. Using DroidChamber, a warfighter can use a single mobile device to manage/transmit data at different security levels, thereby reducing the cost and complexity of a mission.
APA, Harvard, Vancouver, ISO, and other styles
16

Londoño, Sebastián, Christian Urcuqui, Manuel Fuentes Amaya, Johan Gómez, and Andrés Navarro Cadavid. "SafeCandy: System for security, analysis and validation in Android." Sistemas y Telemática 13, no. 35 (December 3, 2015): 89–102. http://dx.doi.org/10.18046/syt.v13i35.2154.

Full text
Abstract:
Android is an operating system which currently has over one billion active users for all their mobile devices, a market impact that is influencing an increase in the amount of information that can be obtained from different users, facts that have motivated the development of malicious software by cybercriminals. To solve the problems caused by malware, Android implements a different architecture and security controls, such as a unique user ID (UID) for each application, while an API permits its distribution platform, Google Play applications. It has been shown that there are ways to violate that protection, so the developer community has been developing alternatives aimed at improving the level of safety. This paper presents: the latest information on the various trends and security solutions for Android, and SafeCandy, an app proposed as a new system for analysis, validation and configuration of Android applications that implements static and dynamic analysis with improved ASEF. Finally, a study is included to evaluate the effectiveness in threat detection of different malware antivirus software for Android.
APA, Harvard, Vancouver, ISO, and other styles
17

S.Kom, Ferry Sudarto, Eka Purwandari, and Aldien Sora Andrea. "PROTOTIPE PENGONTROLAN PINTU GUNA MENGAMANKAN NASKAH SOAL UJIAN NASIONAL PADA SMA NEGERI 11 TANGERANG." CCIT Journal 11, no. 1 (February 20, 2018): 82–94. http://dx.doi.org/10.33050/ccit.v11i1.561.

Full text
Abstract:
Research on "PROTOTYPE DOOR CONTROLLING TO SAVE NATIONAL EXAM SCRIPT AT 11 SENIOR HIGH SCHOOL TANGERANG" aims to provide security benefits in the national exam deception problems. This research was carried out by making a prototype in the form of a door with a security system using technologies of embedded systems. Namely to control a door through Android smartphone. This is because the security system is not running optimally so often lead to deception. Therefore, we need a system to facilitate and secure the national examination script . All this time during the security room to store national test script using only a padlock. This research will provide an overview of the complex mechanisms such as how a door will lock securely using an application on Android smarthphone as the key. The prototype uses a door control basic 4 android as an interface between users. By using Bluetooth as a sensor signal to the sender to call the personal computer (pc) database and added arduino uno as a DC motor controllers. Prototype controlling these doors can be a reference to the department in dealing with security issues manuscript national exam
APA, Harvard, Vancouver, ISO, and other styles
18

Han, Kyoung Soo, Yeoreum Lee, Biao Jiang, and Eul Gyu Im. "Android Permission System Violation." International Journal of E-Entrepreneurship and Innovation 4, no. 1 (January 2013): 16–27. http://dx.doi.org/10.4018/jeei.2013010102.

Full text
Abstract:
Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users.
APA, Harvard, Vancouver, ISO, and other styles
19

Adrianto, Lintang Bagas, Mohammad Iwan Wahyuddin, and Winarsih Winarsih. "Implementasi Deep Learning untuk Sistem Keamanan Data Pribadi Menggunakan Pengenalan Wajah dengan Metode Eigenface Berbasis Android." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, no. 2 (January 1, 2021): 89. http://dx.doi.org/10.35870/jtik.v5i1.201.

Full text
Abstract:
The development of technology in security systems combined with facial recognition, of course, makes every protected data safe. Many methods can be combined with a security system, one of which is the eigenface method, which is part of facial recognition. In this study, a personal data security system was built using Android-based deep learning. Based on the results of tests carried out on three devices with different Android versions, it is known, if on Android 8.1 (Oreo) the maximum distance is ± 40 cm, on Android 9.0 (Pie) the maximum distance is ± 50 cm, and on the Android version, 10.0 (Q) the maximum distance for facial object recognition is ± 60 cm. From the test results, it is known that by using the eigenface method, the farther the face is from the camera, the face cannot be detected. The implementation of this system is expected to protect personal data safely.Keywords:Face recognition, Deep Learning, Android, Eigenface.
APA, Harvard, Vancouver, ISO, and other styles
20

Hidayatullah, Ari, and Yustian Adhi Putra. "Perancangan Sistem Keamanan Perumahan Menggunakan Face Recognition Berbasis Android." Arcitech: Journal of Computer Science and Artificial Intelligence 2, no. 2 (December 31, 2022): 87. http://dx.doi.org/10.29240/arcitech.v2i2.5833.

Full text
Abstract:
Environmental security is an important issue that must be considered, relying on the physical strength of security officers to stand guard 24 hours is not enough, an information and communication technology-based system is needed to assist security officers and neighborhood residents in monitoring the environment and its surroundings from possible disturbances of good crime. from outside as well as from within the environment itself. Based on these environmental security issues, the authors were inspired to design a residential security system application using the face recognition method. The main objective of this research is to help the environmental security system in housing. Data collection methods used are interviews, observation and literature study. The results of this study are residential security system applications using Android-based face recognition. This residential security system application is designed with simple systems and features to make it easier for the user. The Face Recognition method makes it easier for security officers to carry out their duties to recognize people who enter and leave housing. This security system application is designed to help residential residents, especially security officers, to be able to detect known and unknown people in housing.
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Xin, De Lin Chen, Yue Sun, Xu Wang, and Su Ying Yao. "Security Control for TVOS." Applied Mechanics and Materials 643 (September 2014): 136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.643.136.

Full text
Abstract:
Smart TV terminals have become an emerging platform for both personal and business application. Security for applications running on smart TV terminals is important .In this paper we present TVOS, a new OS for enabling high assurance applications to run on smart TV terminal securely. Our main contributions are a new OS architecture and our use of formal methods for proving key security invariants about our implementation. As an operating system, TVOS is still relatively young. To analyze its security and tested its performance. Our evaluation shows that the performance of TVOS is comparable to an Android-based system. In one test, we ran the same web browser on TVOS and on an Android-based system and found that TVOS adds overhead on average to the page load latency time for nine popular web sites.
APA, Harvard, Vancouver, ISO, and other styles
22

Izergin, Dmitriy A., Mikhail A. Eremeev, Shamil G. Magomedov, and Stanislav I. Smirnov. "Information security evaluation for Android mobile operating system." Russian Technological Journal 7, no. 6 (January 10, 2020): 44–55. http://dx.doi.org/10.32362/2500-316x-2019-7-6-44-55.

Full text
Abstract:
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control. The cornerstone of this concept is mobile devices that solve the issue of operational data exchange and processing. Modern mobile services used including the exchange and processing of personalized, banking and critical data are the result of the steady increase in the number of crimes in the field of information security in relation to and using mobile devices. The widespread use of these devices for access to protected information contained in information systems has given special importance to the issue of information security.The subject of this research is to assess the current state of information security mechanisms for mobile operating systems that form the basis of the structure of episodic distributed mobile networks. The Android OS (operating system) was used as an example. The article discusses the problems of the development of a mobile ecosystem and methods aimed at solving them, the main vectors of malicious impact, ways of countering the means of static and dynamic analysis and modern protection mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
23

Hartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda, and Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android." Journal of Students‘ Research in Computer Science 4, no. 2 (November 30, 2023): 273–84. http://dx.doi.org/10.31599/2tgt1y85.

Full text
Abstract:
The power safety system is a series of monitoring and control technologies in the form of features designed to anticipate and increase power safety for drivers and maintain the stability of the vehicle's electrical system while driving. Several power security systems are generally found in most vehicles. Power security systems are a feature in maintaining the vehicle's electrical condition in addition to security devices for a machine against criminal acts such as theft on vehicles which are increasingly common nowadays so it is hoped that it will be able to minimize the shortage of power system requirements on the machine with control and monitoring carried out using an Android-based mobile application. For this reason, this research will create a power monitoring application and security system for vehicle engines in anticipation of additional power consumption when installing engine security against criminal acts through application-based control. The output produced in this research is an Android mobile application as well as a security system device along with power consumption calculations.
APA, Harvard, Vancouver, ISO, and other styles
24

Ilham, Romi. "Android Application for Parking Management and Security System." Jurnal Riset Ekonomi dan Manajemen 17, no. 1 (May 12, 2017): 1. http://dx.doi.org/10.17970/jrem.17.170101.id.

Full text
Abstract:
ABSTRACTNowadays the number of personal vehicles usage in Indonesia is increasing rapidly. People prefer use personal vehicle to commute than public transportation. This study aims to provide a dynamic solution by introducing a design of an Android Application for Parking Management and Security System that regulates the number of vehicles parking with the help of QRcode. The system is basically designed for a college parking which can further be extended as required. The results have shown that (1) multiple vehicles with one QRcode (2) real-time reports (3) parking space quota (4) can photograph vehicles that exit from the parking area and (5) average execution time for QRcode process is 3.8 second.
APA, Harvard, Vancouver, ISO, and other styles
25

Niraghatam, Bhaskar. "HEART BEAT MONITORING SYSTEM AND SECURITY USING ANDROID." International Journal of Advanced Research in Computer Science 8, no. 7 (August 20, 2017): 515–19. http://dx.doi.org/10.26483/ijarcs.v8i7.4347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

., Madhavi Shinde. "SECURITY BASED HOME SURVEILLANCE SYSTEM USING ANDROID APPLICATION." International Journal of Research in Engineering and Technology 03, no. 04 (April 25, 2014): 814–15. http://dx.doi.org/10.15623/ijret.2014.0304143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

M, Gokulnath, and Raagavi G. "Advanced Vehicle Trackiing and Security System using Android." International Journal of Engineering Trends and Technology 36, no. 7 (June 25, 2016): 382–84. http://dx.doi.org/10.14445/22315381/ijett-v36p270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

priya, S. Shanmuga, K. Alagar samy, and A. Sara nya. "Android Platform for the Mobile Application Security System." International Journal of Mobile Computing and Application 5, no. 1 (February 25, 2018): 1–8. http://dx.doi.org/10.14445/23939141/ijmca-v5i1p101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nasution, Torkis, Wilda Susanti, Yandri Armi, and Rangga Rahmadian Yuliendi. "Aplikasi Panic Buton Untuk Keamanan Warga Berbasis Android." Edumatic: Jurnal Pendidikan Informatika 6, no. 1 (June 19, 2022): 39–48. http://dx.doi.org/10.29408/edumatic.v6i1.5127.

Full text
Abstract:
Citizens highly expect environmental security, but criminality is inevitable. The level of crime in the community brings unrest and discomfort, so a security system is needed that is connected with the officers concerned. This study aims to build a security system application connected to environmental security officers. This system can help the public provide reports quickly through the panic button application embedded in Android. System development using the spiral model method. A spiral model is an evolutionary software process model assembling the interactive nature of the prototype using control and systematic aspects of a linear sequential model. Meanwhile, the system design stage uses the Unified Modeling Language (UML). The application is in Android Studio for the design stage, a unique Integrated Development Environment (IDE) that runs on the Android platform. The panic button application is a security system designed to assist the public in providing reports and make it easier for security officers to follow up on the messages given. Accelerate the follow-up process of crimes because it is based on Android.
APA, Harvard, Vancouver, ISO, and other styles
30

Cotterell, Kathryn, Ian Welch, and Aaron Chen. "An Android Security Policy Enforcement Tool." International Journal of Electronics and Telecommunications 61, no. 4 (December 1, 2015): 311–20. http://dx.doi.org/10.1515/eletel-2015-0040.

Full text
Abstract:
Abstract The Android operating system (OS) has become the dominant smart phone OS in recent years due to its accessibility, usability and its open-source philosophy. Consequently, this has also made it a popular target for attackers who aim to install malware on Android devices and take advantage of Android’s coarsegrained, non-revoking permission system. This project designs, implements and evaluates a security tool named COMBdroid, which addresses these security concerns in Android by enforcing fine-grained, user-defined policies. COMBdroid modifies an application before installation, allowing it to override points of security vulnerabilities at run-time. As a proof of concept we have implemented three policies in COMBdroid. This paper documents the development process of COMBdroid, deriving design decisions from the literature review, detailing the design and implementation, and proving the program’s effectiveness through evaluation.
APA, Harvard, Vancouver, ISO, and other styles
31

Erokhin, Viktor. "Flaws in the Android Permission Protocol with Limited Verification." Voprosy kiberbezopasnosti, no. 1(41) (2021): 2–17. http://dx.doi.org/10.21681/2311-3456-2021-1-2-17.

Full text
Abstract:
Purpose of the article: analysis of the resolution protocol implemented in the Android operating system as the most popular for smartphones and other electronic gadgets; consider a formal model of the Android permission protocol and describe the automatic security analysis of this model; identify potential flaws in the permitting protocol. Research method: A formal model of the Android permission protocol based on C++ using the Java NDK based on first-order relational logic is considered, with an analysis engine that performs limited model validation. Result. Created a formal model of Android permission protocol using C ++ using Java NDK. The model identified flaws in the Android permission protocol, and thus exposed Android security vulnerabilities. The developed Android protocol permission model consists of three parts: an Android device architecture query; Android permission scheme request; system operations. Fixed flaws in Android OS related to custom permissions vulnerability. An experiment is presented to demonstrate the feasibility and prevalence of custom permissions vulnerability in existing Android applications. Examination of real Android applications supports our finding that flaws in the Android permission protocol can have serious security implications for electronic gadget applications, and in some cases allows an attacker to completely bypass permission checks. A study of one of the vulnerabilities showed that it is widespread among many existing Android applications. Most developers do not perform any additional validation to ensure that inbound APIs come from trusted applications or vendors, assuming they may not be aware of a custom permissions vulnerability despite its potential for security breaches. The result will be useful for software developers for operating systems with permissions - Android, iOS and Fire OS.
APA, Harvard, Vancouver, ISO, and other styles
32

Hartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda, and Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android." Journal of Students‘ Research in Computer Science 4, no. 2 (November 30, 2023): 273–84. http://dx.doi.org/10.31599/jsrcs.v4i2.3387.

Full text
Abstract:
The power safety system is a series of monitoring and control technologies in the form of features designed to anticipate and increase power safety for drivers and maintain the stability of the vehicle's electrical system while driving. Several power security systems are generally found in most vehicles. Power security systems are a feature in maintaining the vehicle's electrical condition in addition to security devices for a machine against criminal acts such as theft on vehicles which are increasingly common nowadays so it is hoped that it will be able to minimize the shortage of power system requirements on the machine with control and monitoring carried out using an Android-based mobile application. For this reason, this research will create a power monitoring application and security system for vehicle engines in anticipation of additional power consumption when installing engine security against criminal acts through application-based control. The output produced in this research is an Android mobile application as well as a security system device along with power consumption calculations. Keywords: Android Control System, Machine Safety System, Power Monitoring Abstrak Sistem keamanan daya pada serangkaian teknologi monitoring serta kontrol berupa fitur yang dirancang untuk mengantisipasi dan meningkatkan keamanan daya pada pengendara dan menjaga stabilitas sistem kelistrikan kendaraan saat berkendara. Beberapa sistem keamanan daya yang umumnya ditemukan pada sebagian besar kendaraan. Sistem keamanan daya sebagai fitur dalam menjaga kondisi kelistrikan kendaraan dalam penambahan perangkat keamanan suatu mesin terhadap tindak kriminal seperti pencurian pada kendaraan yang semakin marak saat ini sehingga diharapkan mampu meminimalisir kekurangan kebutuhan sistem daya pada mesin dengan control dan monitoring yang dilakukan menggunakan apikasi mobile berbasis Android. Untuk itu pada penelitian akan membuat suatu aplikasi monitoring daya dan sistem keamanan pada mesin kendaraan sebagai antisipasi terhadap penambahan konsumsi daya pada pemasangan keamanan mesin terhadap tindakan kriminal melalui kontrol berbasis aplikasi. Luaran yang dihasilkan pada penelitian berupa apikasi mobile Android serta perangkat sistem keamanan beserta perhitungan konsumsi daya. Kata kunci: Android Sistem Control, Monitoring Daya, Sistem Keamanan Mesin
APA, Harvard, Vancouver, ISO, and other styles
33

Borysiewicz, Tomasz. "System and hardware security options available for users on devices running Android operating system." Journal of Computer Sciences Institute 8 (November 30, 2018): 220–25. http://dx.doi.org/10.35784/jcsi.684.

Full text
Abstract:
Producer of Android operating system have been trying to offer ways to protect digital data on devices since 1st version of this platform. Development of possibilities of operating system and new technological solutions allows to launch more innovate protections, which are not only more secure, but also very comfortable in everyday usage. This article presents comparison of available solutions, both in terms of the best protection and convenience of usage. The topic of convenience of usage required research to collect information about the most popular configurations among users. The analysis of security level of available locks and obtained results allowed to verify whether owners of devices running Android operating system are properly securing digital data stored in internal memory of their devices
APA, Harvard, Vancouver, ISO, and other styles
34

Delgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.

Full text
Abstract:
Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing. However, its feasibility is still in question due to two major drawbacks: safety and security. In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements. In this sense, we explore the real-time characteristics of Xenomai to guarantee strict temporal deadlines, and provide a viable method integrating Android processes to real-time tasks. Security is another issue that affects safety due to the increased connectivity in industrial systems provoking a higher risk of cyber and hardware attacks. Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. These policies ensure that the developed system is protected from physical tampering and unwanted Android applications. The articulacy of the administrative policies is demonstrated through experiments. The developed embedded system is connected to an industrial EtherCAT motion device network exhibiting operability on an actual industrial application. Real-time performance was evaluated in terms of schedulability and responsiveness, which are critical in determining the safety and reliability of the control system.
APA, Harvard, Vancouver, ISO, and other styles
35

Jagtap, Akash, Anil Sarwade, Harshal Jhalawat, and Mrs R. V. Chaudhari. "Secret Questions based Authentication System for Android Smartphone." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 10, 2019): 01–03. http://dx.doi.org/10.17762/ijritcc.v7i4.5275.

Full text
Abstract:
We present a android application for enhanced security of password recovery questions.We make use of the sensors available in an basic andorid smartphone to provide security.Many web applications as well as android applications use old and easy to break through questions for password retrieval which can be easily guessed by anyone having zero to very little information about the user.Our system is based on users short term memory.We make use of smartphone sensors and ask questions which are only known to user relying on his short term memory for password retrieval.We present sensor based security questions for password retreival which ultimately increase the security and provide genuine authentication.
APA, Harvard, Vancouver, ISO, and other styles
36

AL-Akhras, Mousa, Abdulrhman ALMohawes, Hani Omar, amer Atawneh, and Samah Alhazmi. "Android malicious attacks detection models using machine learning techniques based on permissions." International Journal of Data and Network Science 7, no. 4 (2023): 2053–76. http://dx.doi.org/10.5267/j.ijdns.2023.8.019.

Full text
Abstract:
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars. Security is the main challenge to any operating system. Android malware attacks and vulnerabilities are known as emerging risks for mobile devices. The development of Android malware has been observed to be at an accelerated speed. Most Android security breaches permitted by permission misuse are amongst the most critical and prevalent issues threatening Android OS security. This research performs several studies on malware and non-malware applications to provide a recently updated dataset. The goal of proposed models is to find a combination of noise-cleaning algorithms, features selection techniques, and classification algorithms that are noise-tolerant and can achieve high accuracy results in detecting new Android malware. The results from the empirical experiments show that the proposed models are able to detect Android malware with an accuracy that reaches 87%, despite the noise in the dataset. We also find that the best classification results are achieved using the RF algorithm. This work can be extended in many ways by applying higher noise ratios and running more classifiers and optimizers.
APA, Harvard, Vancouver, ISO, and other styles
37

Hamandi, Khodor, Alaa Salman, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. "Messaging Attacks on Android: Vulnerabilities and Intrusion Detection." Mobile Information Systems 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/746930.

Full text
Abstract:
Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS) that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.
APA, Harvard, Vancouver, ISO, and other styles
38

Adharda, Muhammad Akmal, Maman Somantri, and Sudjadi Sudjadi. "PERANCANGAN ANTARMUKA SMART SECURITY SYSTEM TAMBAK UDANG BERBASIS ANDROID." Transient: Jurnal Ilmiah Teknik Elektro 10, no. 1 (March 17, 2021): 106–13. http://dx.doi.org/10.14710/transient.v10i1.106-113.

Full text
Abstract:
Salah satu permaslahan yang sangat meresahkan saat ini adalah masalah pencurian. Pencurian merupakan masalah yang sangat merugikan bagi korban pencurian. Banyak dari pencurian tersebut terjadi pada malam hari saat tingkat kewaspadaan masyarakat mulai berkurang. Kamera CCTV (Closed-Circuit Television) dapat digunakan sebagai langkah meningkatkan sistem keamanan dari pencurian pada area yang telah dipasang kamera CCTV. Akan tetapi, sistem kamera CCTV ini hanya berfungsi sebagai sistem pemantau keamanan pasif saja. Disisi lain, perkembangan teknologi didukung dengan adanya perkembangan mobile apps salah satunya adalah aplikasi Android. Selain mempermudah dalam melakukan komunikasi dan bertukar informasi, teknologi ini juga mempermudah penggunaan jasa atau aktivitas secara praktis melalui smartphone. Penelitian ini dilakukan untuk menghasilkan sebuah aplikasi Android yang dapat menerima peringatan berupa notifikasi, menampilkan tangkapan gambar, dan menampilkan video livestream dari kamera CCTV yang dipasang di area tambak udang (Maritime Science Techno Park) MSTP Undip, Jepara. Aplikasi Android ini dirancang menggunakan Bahasa Pemrograman Dart dan Framework Flutter. Untuk mendukung fitur notifikasi yang mumpuni, digunakan layanan push Notification yaitu One Signal Push Notification.
APA, Harvard, Vancouver, ISO, and other styles
39

Stephan, Jane, and Zahra Dhaief. "SMS Encryption by Using Android Operating System." Iraqi Journal for Computers and Informatics 41, no. 1 (December 31, 2014): 47–50. http://dx.doi.org/10.25195/ijci.v41i1.97.

Full text
Abstract:
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunicationcompanies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS) hasbecome very popular for sending messages containing information among mobile users. Alongside, the need for the secure communicationbecame more imperative. SMS security ensures security of messages from the access of unauthorized users. Using RSA algorithm to encryptionof message that length is 160 character. In this paper present approach encryption message for type a SMS then send to other user. This approachis applied in mobile environment with android operating system. The platform used here is JAVA and the proposed approach is tested differenttypes of mobile types (Galaxy S3, Galaxy S4, HTC).
APA, Harvard, Vancouver, ISO, and other styles
40

Lovebbi, Lovebbi, and Dodick Z. Sudirman. "Rancang Bangun Aplikasi Steganografi dengan Metode Least Significant Bit di Audio pada Sistem Operasi Android." Jurnal ULTIMATICS 4, no. 1 (June 1, 2012): 7–16. http://dx.doi.org/10.31937/ti.v4i1.303.

Full text
Abstract:
Easy access to information this day, has increase the importance of security, especially private and secret information. the big amount of data transaction via smartphone without a proper data security has become a problem that needs attention. This paper’s goal is to implements steganography with least significant bit method for audio as alternative to data security. The implementations is done in Android operating system and produce an application for hiding message. This research proves that least significant bit in Android operating system fulfill the criteria of good steganography method. Keywords—data security, steganography, least significant bit, android
APA, Harvard, Vancouver, ISO, and other styles
41

Sudakov, A. Yu, and A. V. Sokolov. "DEVELOPMENT OF CLIENT-SERVER APPLICATION SECURITY SYSTEM BASED ON ANDROID OPERATING SYSTEM." INFORMATICS AND MATHEMATICAL METHODS IN SIMULATION 10, no. 3-4 (December 2, 2020): 197–207. http://dx.doi.org/10.15276/imms.v10.no3-4.197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Salve, Nisarg. "Mobile Activity Monitoring System Using Android Spy." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 22, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30031.

Full text
Abstract:
Now a days Android mobiles are everywhere in the world, but if we consider the area such as IT industry, organizations, educational institutes, businesses in these sectors all the employee with their android smart phone performs much activities. Every company, organization having their own policies, rules, future projects so in such cases the privacy, security and confidentiality must be maintained by the employee of the organization. So it’s very important to track their mobile phones whether they are leaking the confidential data or they are doing wrong call, wrong SMS, or crossing out the organization’s geographical area in working hours. After considering all these factors, we implemented the system “Mobile Activity Monitoring System Using Android Spy” This system is implemented for tracking the daily activity of the users with their android mobiles. The information such as call log, SMS along with its date and time will be tracked and updated to the server this server will be monitored by the administrator. This information can be maintained for security purpose of the organization such as leaking the confidential data and maintaining policies of organization. Key Words: Android, Monitoring, Tracking, Call log, Date, SMS
APA, Harvard, Vancouver, ISO, and other styles
43

Wuryanto, Endro Dwi, and Andi Setiadi. "KENDALI KEAMANAN RUMAH JARAK JAUH BERBASIS RASBERRY DAN ANDROID." JIPETIK:Jurnal Ilmiah Penelitian Teknologi Informasi & Komputer 1, no. 2 (November 28, 2020): 42–45. http://dx.doi.org/10.26877/jipetik.v1i2.4387.

Full text
Abstract:
Smart Home is one of the tools that is developed for ease of automation of smart home management from the start of address, security, comfort, savings, through automation with Android. In designing a micro home security system controller using raspberry pi 3 and Android smartphones that can reduce the number of criminal acts of burglary door. This tool consists of an electro magnetic door lock called a solenoid door lock.This solenoid key is placed on the door of the house for security. The design of this home door security system utilizes Raspberyy pi b + as a control device from near and far by utilizing the wifi network and sms gateway to control opening and closing the home door lock that is controlled via an android mobile. Through web bootstrap that will display the results captured by the camera to provide a home situation every time someone enters.This house door security system that has been successfully built and tested with the working principle if there is someone who forces or breaks the house door in a closed condition, the system will activate a warning or alarm by sounding the buzzer¸ because there is an LDR sensor connected to one switch connected to the solenoid key that results, if the key is opened with a security system then the LDR sensor will turn off and there will be no alarm, but if it is forced to break the LDR sensor will activate and read the movement of the door so that the reaction occurs and the buzzer alarm will sound. This security system is a solution to increase the level of home security ¸ besides this sophisticated system is very easy to use and integrated with android smartphonesKeywords: homer security; smart home; android; rasberryPI; LDR
APA, Harvard, Vancouver, ISO, and other styles
44

Pardhi, Pravin, Chetna D. Dhote, Riteshwari A. Pagote, Suwarna S. Somkuwar, and Minakshi P. Dhanorkar. "Smart Wearable System for Women Security using Internet of Things (IoT)." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 04 (December 31, 2022): 155–58. http://dx.doi.org/10.18090/samriddhi.v14i04.25.

Full text
Abstract:
Women safety is a big issue in even today’s modern world driven by advanced technologies. This function demonstrates an efficient women safety identification system using a GPS modem. The proposed women protection device aims to provide complete protection to women in the present scenarios. This device provides a safe and peaceful environment for women with handbag security and android application. This work aims to integrate the Internet of things (IOT) based women’s safety device with the device’s hardware linked in the handbag, Android application and Bluetooth connectivity in smartphone. After pressing the device key the Android Application identifies the location of the victim’s place via GPS and sends a message containing this location URL to the registered contact and also call on the first registered contact to help them in a dangerous situation and also send the alert message to the registered mobile number. location tracking information through SMS helps find out the victim’s current location quickly and can be saved securely.
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Pengju, Guojun Peng, and Jing Fang. "A Secure Communication and Access Control Scheme for Native Libraries of Android Applications." Security and Communication Networks 2022 (April 8, 2022): 1–12. http://dx.doi.org/10.1155/2022/3923690.

Full text
Abstract:
The Android system cannot perform fine-grained permission management for TPLs (third-party libraries) in applications. TPLs can use all permissions of the host application, which poses a threat to users and system security. In order to solve this problem, this paper studies the underlying principles of multiple modules in the framework and kernel layers of the Android system. We construct a fine-grained access control scheme for native libraries through technologies such as isolation environment creation, remote function call, and dynamic permission management. We also implement the prototype system. The experimental results show that our proposed scheme can effectively assist developers in managing the permissions of the native libraries in a fine-grained manner and curb the suspicious privileged behaviors of the native libraries. Meanwhile, our proposed scheme is adaptable for high-version Android systems with reasonable overhead, and it will not break the current Android security mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
46

Karthikeyan, Dakshinamoorthy, Arun Sivakumar, and Chamundeswari Arumugam. "Android X-Ray - A system for Malware Detection in Android apps using Dynamic Analysis." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (November 7, 2022): 264–71. http://dx.doi.org/10.37394/23209.2022.19.27.

Full text
Abstract:
In recent years, mobile malware takes anywhere between several hours to several days to screen an app for malicious activity. More than 6000 apps are added to the Google Play Store everyday on average. Security analysts face an uphill battle against malware developers as the complexity of malware and code obfuscation techniques are constantly increasing. Currently, most research focuses on the development and application of machine learning techniques for malware detection. However, their success has been limited due to a lack of depth in the data sets available for training models. This paper uses a new method of Dynamic Analysis for Android apps to extract large amounts of information on the behavior of any app which can then be used for training models or to enable security analysts to take an informed decision quickly.
APA, Harvard, Vancouver, ISO, and other styles
47

Hutchinson, Shinelle, Miloš Stanković, Samuel Ho, Shiva Houshmand, and Umit Karabiyik. "Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS." Journal of Cybersecurity and Privacy 3, no. 2 (April 7, 2023): 145–65. http://dx.doi.org/10.3390/jcp3020009.

Full text
Abstract:
The emergence of the Internet of Things technologies and the increase and convenience of smart home devices have contributed to the growth of self-installed home security systems. While home security devices have become more accessible and can help users monitor and secure their homes, they can also become targets of cyberattacks and/or witnesses of criminal activities, hence sources of forensic evidence. To date, there is little existing literature on forensic analysis and the security and privacy of home security systems. In this paper, we seek to better understand and assess the forensic artifacts that can be extracted, the security and privacy concerns around the use of home security devices, and the challenges forensic investigators might encounter, by performing a comprehensive investigation of the SimpliSafe security system. We investigated the interaction of the security system with the SimpliSafe companion app on both Android and iOS devices. We analyzed the network traffic as the user interacts with the system to identify any security or privacy concerns. Our method can help investigators working on other home security systems, and our findings can further help developers to improve the confidentiality and privacy of user data in home security devices and their applications.
APA, Harvard, Vancouver, ISO, and other styles
48

Rama, Gilang Aditya, Fauziah Fauziah, and Nurhayati Nurhayati. "Perancangan Sistem Keamanan Brangkas Menggunakan Pengenalan Wajah Berbasis Android." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 3 (July 20, 2020): 635. http://dx.doi.org/10.30865/mib.v4i3.2149.

Full text
Abstract:
The level of security in terms of access is one of the main priorities of everyone to improve the security system that feels the need for improvement following the development of modern technology. This study discusses a security system using Android-based face recognition. The aim of this research is that the safe safety system has a better level of security than the previous system. The initial stage to build this system, the authors do the literature data collection stage as a basis for the theory and system development methods used by software designers before is the waterfall method, in general this method is divided into several stages, including: Analysis, Design, Program Code and Unit Testing. For the method used in the research of this system is the eigenfaces algorithm method for the detection of facial objects in the initial process of image training. As well as the Local Binary Patterns algorithm method and Histrogram Equalization at the stage of reading the user's face recognition image accurately which has an accuracy of face reading up to 95.56%. The results of the user's face data will be processed in Wemos D1 and the data will be sent and stored in a database. The results of data from face recognition data will be used again as user data to open the safe. The conclusion, the system can read the user's face in real time and can work well for safe security systems
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Chanhee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi, and Yeongung Park. "Unified security enhancement framework for the Android operating system." Journal of Supercomputing 67, no. 3 (August 6, 2013): 738–56. http://dx.doi.org/10.1007/s11227-013-0991-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Romadhon, A. S. "System Security And Monitoring On Smart Home Using Android." Journal of Physics: Conference Series 953 (January 2018): 012128. http://dx.doi.org/10.1088/1742-6596/953/1/012128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography