Literatura académica sobre el tema "Android system security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Android system security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Android system security"
Jadhav, Atul Chandrakant y Sunil P. Khachane. "AntiRIG Security System in Android". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 6 (30 de junio de 2017): 346–49. http://dx.doi.org/10.23956/ijarcsse/v7i6/0261.
Texto completoHan, So-Ra y Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security". Bonfring International Journal of Industrial Engineering and Management Science 7, n.º 1 (31 de marzo de 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.
Texto completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi y Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi y Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completoMarpaung, Ruth Shyintia Rouli. "Android Based Door Security Design". Brilliance: Research of Artificial Intelligence 2, n.º 1 (1 de junio de 2022): 26–30. http://dx.doi.org/10.47709/brilliance.v2i1.1535.
Texto completoPark, Jae-Kyung y Sang-Yong Choi. "Studying Security Weaknesses of Android System". International Journal of Security and Its Applications 9, n.º 3 (31 de marzo de 2015): 7–12. http://dx.doi.org/10.14257/ijsia.2015.9.3.02.
Texto completoHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu y Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone". Wireless Communications and Mobile Computing 2020 (21 de septiembre de 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Texto completoFadjar Bastari, Winarno y Muhammad Andri Eko Prasetyo. "Locker Security System Design Based On Internet of Things (IoT) Android Interface". BEST : Journal of Applied Electrical, Science, & Technology 3, n.º 2 (15 de septiembre de 2021): 30–35. http://dx.doi.org/10.36456/best.vol3.no2.4323.
Texto completoZulfian Wathoni, Khairunazri y Muh. Fahrurrozi. "Motorcycle Safety System With Android Based Arduino". TEKNIMEDIA: Teknologi Informasi dan Multimedia 1, n.º 2 (5 de enero de 2021): 57–63. http://dx.doi.org/10.46764/teknimedia.v1i2.26.
Texto completoTung, Shu Chu, Wu Jeng Li y Shih Miao Huang. "A Web-Based Android Supervisory Control System". Applied Mechanics and Materials 284-287 (enero de 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Texto completoTesis sobre el tema "Android system security"
Cheng, Zhiyong. "A multi-agent security system for Android platform". Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43775.
Texto completoXu, Mingzhe. "Security Enhancement of Secure USB Debugging in Android System". University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1417536423.
Texto completoBurguera, Hidalgo Iker. "Behavior-based malware detection system for the Android platform". Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73647.
Texto completoVančo, Matúš. "Dynamická úprava bezpečnostní politiky na platformě Android". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255426.
Texto completoPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem". Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Texto completoWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Borek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Texto completoSmartphones ger tillgång till en uppsjö av privat information som potentiellt kan leda till finansiella och personliga svårigheter. Därför måste de vara väl skyddade. En dynamisk lösning behövs som skyddar Android-telefoner i realtid. Systemanrop har tidigare undersökts som en effektiv metod för dynamisk analys av Android. Emellertid fokuserade dessa tidigare studier på systemanrop i en emulerad sandbox miljö, vilket inte visar lämpligheten av detta tillvägagångssätt för realtidsanalys av själva enheten. Detta arbete fokuserar på analys av Linux kärnan systemanrop på ARMv8 arkitekturen. Givet begränsningarna som existerar i Android-telefoner är det väsentligt att minimera resurserna som krävs för analyserna. Därför fokuserade vi på sekvenseringen av systemanropen. Med detta tillvägagångssätt sökte vi en metod som skulle kunna användas för realtidsdetektering av skadliga program direkt på Android-telefoner. Vi experimenterade dessutom med olika funktionsvektorer för att representera data; histogram, n-gram och co-occurrence matriser. All data hämtades från en riktig Android enhet då de existerande Android emulatorerna visade sig vara olämpliga för att emulera ett system med ARMv8 arkitekturen. Resultaten visar att Linus kärnans sekvensering har tillräckligt med information för att upptäcka skadligt beteende av skadliga applikationer på ARMv8 arkitekturen. Alla funktionsvektorer presterade bra. N-gram och cooccurrence matriserna uppnådde till och med lysande resultat. För att reducera beräkningskomplexiteten av analysen, experimenterade vi med att enbart använda de vanligaste systemanropen. Fast noggrannheten minskade lite, var det värt uppoffringen eftersom beräkningskomplexiteten reducerades märkbart.
Trabalza, Daniele. "Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System". Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119825.
Texto completoPalm, Alexander y Benjamin Gafvelin. "Ethical Hacking of Android Auto in the Context of Road Safety". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299647.
Texto completoI takt med en evigt ökande efterfrågan på att sammankoppla smarttelefoner med infotainmentsystem, har allt fler börjat använda Android Auto i sina fordon världen över. En bieffekt av att allt fler sammankopplar sina mobiler till infotainmentsystem, är att det leder till fler möjligheter för illvilliga parter att stjäla privat data och sätta Android Autoanvändares liv i fara. Målet med denna avhandling är att fastställa hur säkert Android Auto är i avseende till vägsäkerhet. Den huvudsakliga forskningsfrågan är att lista ut om Android Auto kan attackeras av attacker som utnyttjar sårbarheter i Android operativsystemet. Forskningsfrågan besvarades genom att skapa flertal konceptattacker mot Android Auto användandes av ett emulerat infotainmentsystem och mobiltelefoner. En utredning utfördes även gällande applikationens kommunikationskanal mellan telefonen och infotainmentskärmen. Resultatet från denna avhandling demonstrerade att många attacker är tillräckligt allvarliga för att äventyra trafikanternas säkerhet. Det finns en avsevärd risk för framgångsrika attacker när Android Auto körs lokalt på telefonen utan en USB koppling till infotainmentsystemet, och en liten risk när telefonen är kopplad till infotainmentsystemet. Avlyssning och uppfångning av kommunikationen i USB kanalen visade att en krypteringsalgoritm vars version har existerande sårbarheter kan avkrypteras och utnyttjas för att potentiellt attackera Android Auto.
Krishnan, Neelima. "Android Hypovisors: Securing Mobile Devices through High-Performance, Light-Weight, Subsystem Isolation with Integrity Checking and Auditing Capabilities". Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/51129.
Texto completoMaster of Science
Bjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Texto completoLibros sobre el tema "Android system security"
service), ScienceDirect (Online, ed. Android forensics: Investigation, analysis, and mobile security for Google Android. Waltham, MA: Syngress, 2011.
Buscar texto completoAndroid security: Attacks and defenses. Boca Raton: Taylor & Francis, 2013.
Buscar texto completoJiang, Xuxian. Android Malware. New York, NY: Springer New York, 2013.
Buscar texto completoShane, Hartman, Morales Jose Andre, Quintans Manu y Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Buscar texto completoHoog, Andrew. Android Forensics: Investigation, Analysis and Mobile Security for Google Android. Elsevier Science & Technology Books, 2011.
Buscar texto completoTomal, Sazzad Mahmud. Hacking : Art of Breaking System: Hacking Website, Android and Security Systems. Independently Published, 2019.
Buscar texto completoAndroid Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press, 2014.
Buscar texto completoMisra, Anmol y Abhishek Dubey. Android Security. Taylor & Francis Group, 2019.
Buscar texto completoAndroid Apps Security. Apress, 2012.
Buscar texto completoMisra, Anmol y Abhishek Dubey. Android Security: Attacks and Defenses. Taylor & Francis Group, 2013.
Buscar texto completoCapítulos de libros sobre el tema "Android system security"
Zhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie y Gaofei Wu. "An Android Vulnerability Detection System". En Network and System Security, 169–83. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.
Texto completoZhauniarovich, Yury. "Security of the Android Operating System". En Lecture Notes in Computer Science, 272–74. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17127-2_22.
Texto completoZhang, Tong, Tao Li, Hao Wang y Zhijie Xiao. "AndroidProtect: Android Apps Security Analysis System". En Collaborate Computing: Networking, Applications and Worksharing, 583–94. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59288-6_58.
Texto completoAbdul Kadir, Andi Fitriah, Natalia Stakhanova y Ali Akbar Ghorbani. "Android Botnets: What URLs are Telling Us". En Network and System Security, 78–91. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_6.
Texto completoJin, Junjie y Wei Zhang. "System Log-Based Android Root State Detection". En Cloud Computing and Security, 793–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_69.
Texto completoSanz, Borja, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez y Pablo G. Bringas. "MADS: Malicious Android Applications Detection through String Analysis". En Network and System Security, 178–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38631-2_14.
Texto completoAndriatsimandefitra, Radoniaina y Valérie Viet Triem Tong. "Capturing Android Malware Behaviour Using System Flow Graph". En Network and System Security, 534–41. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3_43.
Texto completoLu, Yemian, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan y Wei Guo. "A Comprehensive Study of Permission Usage on Android". En Network and System Security, 64–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_5.
Texto completoGupta, Ravika, Gulshan Shrivastava, Rohit Anand y Tina Tomažič. "IoT-Based Privacy Control System through Android". En Handbook of e-Business Security, 341–63. Boca Raton, FL : CRC Press, 2018.: Auerbach Publications, 2018. http://dx.doi.org/10.1201/9780429468254-14.
Texto completoFioravanti, Mark E., Ayush Shah y Shengzhi Zhang. "A Study of Network Domains Used in Android Applications". En Network and System Security, 467–74. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_35.
Texto completoActas de conferencias sobre el tema "Android system security"
Khokhlov, Igor y Leon Reznik. "Android system security evaluation". En 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2018. http://dx.doi.org/10.1109/ccnc.2018.8319325.
Texto completoShukla, Ankur, Divya Vikash, Bharavi Mishra y Poonam Gera. "Permission recommender system for Android". En SIN '17: Security of Information and Networks. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3136825.3136860.
Texto completoCajic, Miroslav, Bogdan Brkic y Mladen Veinovic. "System of assessment security for Android operating system". En 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419491.
Texto completoAbhadiomhen, S. E., R. Nzeh, N. J. Ezeora, I. Uzo, B. C. Uzo, N. E. Ogbene y G. E. Anichebe. "Design Of An Automated Home Security System With Remote Monitoring Capability. Proceedings of the 28th iSTEAMS Intertertiary Multidisciplinary Conference". En 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p4.
Texto completoGuo, Tao, Puhan Zhang, Hongliang Liang y Shuai Shao. "Enforcing Multiple Security Policies for Android System". En 2nd International Symposium on Computer, Communication, Control and Automation. Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/3ca-13.2013.42.
Texto completoChen, Yuanchun, Ning Liu, Guangtao Zhai, Zhongpai Gao y Ke Gu. "Information security display system on android device". En TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848294.
Texto completoRoy, Sulochana. "IOT Enabled Security System for Android users". En 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE). IEEE, 2018. http://dx.doi.org/10.1109/icrieece44171.2018.9008874.
Texto completoSharma, Rupam Kumar, Ayub Mohammad, Himanka Kalita y Dhiraj Kalita. "Android interface based GSM home security system". En 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2014. http://dx.doi.org/10.1109/icicict.2014.6781278.
Texto completoSun, Lin, ShuTao Huang, YunWu Wang y MeiMei Huo. "Application Policy Security Mechanisms of Android System". En 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS). IEEE, 2012. http://dx.doi.org/10.1109/hpcc.2012.258.
Texto completoLi, Yingbo, Xiao Lu y Jing Fang. "Android system security vulnerability and response measures". En The 2nd Information Technology and Mechatronics Engineering Conference (ITOEC 2016). Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/itoec-16.2016.27.
Texto completo