Spelling suggestions: "subject:"android"" "subject:"dendroid""
521 |
Разработка приложения для подбора пары домашним животным «MeetPet» : магистерская диссертация / Development of an application for matching pets “MeetPet”Шарафутдинов, Г. О., Sharafutdinov, G. O. January 2023 (has links)
Целью работы является разработка приложения для подбора пары домашним животным. Объектом исследования являются мобильные приложения на базе операционной системы Android. Методы исследования включают: анализ, сравнение и обобщение данных о существующих веб-сервисах по уходу и разведению домашних животных; апробация современных технологий мобильной разработки. Результатом работы является разработанное приложение, включающее в себя серверную часть с автоматической обработкой PDF-файлов и клиентской в виде Android-приложения. / The goal of the work is to develop an application for matching pets. The object of the study is mobile applications based on the Android operating system. Research methods include: analysis, comparison and synthesis of data on existing web services for the care and breeding of pets; testing of modern mobile development technologies. The result of the work is a developed application, which includes a server part with automatic processing of PDF files and a client part in the form of an Android application.
|
522 |
Encrypting IMSI to improve privacy in 5G NetworksCobo Jiménez, Enrique January 2017 (has links)
Nowadays, the long-term identifier of a user in a mobile network, namely International Mobile Subscriber Identity or IMSI, is transmitted in clear text over the radiointerface. Given that this interface is used as a shared medium, anyone with a radio transceiver and processing software can thus read such identifier. This fact constitutes a threat to user privacy, considering that the user is traceable by following the presence of the identifier in the network. Moreover, the menace has been known in the literature for the last 25 years, but no countermeasures have been deployed because the severity was judged not to be sufficiently high. However, the current situation is different. One the one hand, the user is made more vulnerable: the needed equipment for catching IMSIs over the radio interface is becoming cheaper, while user-related connected devices are arising in the form of Internet of Things. On the other hand, mobile devices are now computationally more powerful, and the upcoming standardization of 5G represents an opportunity to address such issues. This dissertation presents a proposal to encrypt the IMSI based on Elliptic Curve Integrated Encryption Scheme, a public-key approach in which the long-term subscription identifier is concealed over the radio interface. By doing so, the IMSI is never publicly disclosed, and thus privacy is enhanced. Besides, research was conducted to show the technical feasibility of the proposal. First, the impact of the encrypted identifier on the network was studied. Secondly,the execution time needed for Android devices to perform encryption operations was measured. In both cases, the results were favorable, drawing the conclusion that there are no impediments to the adoption of the presented solution. The Thesis was developed in cooperation with Ericsson AB, Security Research. / Den långsiktiga identifieraren för en användare i ett mobilt nätverk, IMSI (International Mobile Subscriber Identity), överförs i klartext via radiogränssnittet. Med detta gränssnitt som delat medium kan någon med en radiomottagare och mjukvara läsasåna identierare. Detta utgör ett hot mot användarnas personliga integritet med tanke på att användaren kan spåras genom att följa förekomsten av identifierare i nätverket. Dessutom har hotet varit känt under de senaste 25 åren, men inga åtgärder har använts eftersom att risken bedömdes inte vara tillräckligt hög. Däremot är den nuvarande situationen annorlunda. Å ena sidan är användaren mer sårbar: den utrustning som behövs för att fånga IMSI över radiogränssnittet blir billigare medan antalet användarrelaterade anslutna enheter ökar. Å andra sidan kan moderna mobila enheter utföra mycket mer beräkningar, och den kommande standardiseringen av 5G utgör en möjlighet att lösa sådana problem. Rapporten presenterar ett förslag för att kryptera IMSI baserat på ECIES (Elliptic Curve Integrated Encryption Scheme), en asymmetrisk-kryptografi algoritm där den långsiktiga identifieraren är dold över radiogränssnittet. Genom att göra så avslöjas aldrig IMSI, och därmed förbättras den personliga integriteten. Dessutom har forskning bedrivits för att visa den tekniska genomförbarheten avförslaget. Först studerades effekten av den krypterade identifieraren i nätverket. Sedan mättes exekveringstiden som krävs för Android-enheter för att utföra krypteringsoperationer. I båda fallen var resultaten gynnsamma, och därav dras slutsatsen att det inte finns några hinder för antagandet av den presenterade lösningen. Denna rapport framställdes i samarbete med Ericsson AB, Security Research.
|
523 |
A Security and Privacy Audit of KakaoTalk’s End-to-End EncryptionSchmidt, Dawin January 2016 (has links)
End-to-end encryption is becoming a standard feature in popular mobile chat appli-cations (apps) with millions of users. In the two years a number of leading chat apps have added end-end encryption features including LINE, KakaoTalk, Viber, Facebook Messenger, and WhatsApp.However, most of these apps are closed-source and there is little to no independent ver-ification of their end-to-end encryption system design. These implementations may be a major concern as proprietary chat apps may make use of non-standard cryptographic algorithms that may not follow cryptography and security best practices. In addition, governments authorities may force chat app providers to add easily decryptable export-grade cryptography to their products. Further, mainstream apps have a large attack surface as they offer a variety of features. As a result, there may be software vulnera-bilities that could be exploited by an attacker in order to compromise user’s end-to-end privacy. Another problem is that, despite being closed-source software, providers often market their apps as being so secure that even the provider is not able to decrypt messages. These marketing claims may be potentially misleading as most users do not have the technical knowledge to verify them.In this Master’s thesis we use KakaoTalk – the most popular chat app in South Korea – as a case study to perform a security and privacy assessment and audit of its “Secure Chat” opt-in end-to-end encryption feature. Also, we examine KakaoTalk’s Terms of Service policies to verify claims such as “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” from a technical perspective.The main goal of this work is to show how various issues in a product can add up to the potential for serious attack vectors against end-to-end privacy despite there being multiple layers of security. In particular, we show how a central public-key directory server makes the end-to-end encryption system vulnerable to well-known operator-site man-in-the-middle attacks. While this naive attack may seem obvious, we argue that (KakaoTalk) users should know about the strength and weaknesses of a particular design in order to make an informed decision whether to trust the security of a chat app or not. / End-to-end kryptering är en allt mer vanligt förekommande funktionalitet bland populära mobila chatttjänster (händanefter appar) med miljontals användare. Under de två senaste åren har många ledande chattappar, bland annat LINE, KakaoTalk, Viber, Facebook Messenger, och WhatsApp, börjat använda end-to-end kryptering. Dock så är de flesta av dessa appar closed-source och det finns begränsad, eller ingen, fristående granskning av systemdesignen för deras end-to-end kryptering. Dessa implementationer kan innebära en stor risk då proprietära chattappar kan använda sig av kryptografiska algoritmer som inte följer best practice för säkerhet eller kryptografi. Vidare så kan statliga myndigheter tvinga de som tillhandahåller chattappar att använda lättdekrypterad export-grade kryptografi för sina produkter. Lägg till det att de flesta vanliga appar har många ytor som kan attackeras, till följd av all funktionalitet de erbjuder. Som ett resultat av detta finns en risk för mjukvarubrister som kan utnyttjas av en hackare för att inkräkta på en användares end-to-end integritet. Ytterligare ett problem är att trots att det är closed-source mjukvara så marknadsför ofta appleverantörerna sina appar som att vara är så säkra att inte ens leverantörerna själva kan dekryptera användarnas meddelanden. Det som hävdas i marknadsföringen riskerar vara missledande eftersom de flesta användarna inte har den tekniska kunskap som krävs för att kunna verifiera att det som hävdas är sant. I den här Master-uppsatsen använder vi KakaoTalk – den mest populära chattappen i Sydkorea – som en fallstudie för att granska och bedömma säkerhetens- och integritets-aspekterna hos deras valbara “Secure Chat” med end-to-end krypteringsfunktionalitet. Vi granskar även KakaoTalk’s användarvillkor för att kunna verifiera påståenden som att “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” från ett tekniskt perspektiv. Det huvudsakliga syftet med denna studien är att belysa hur olika brister i en produkt sammantagna kan skapa en risk för allvarliga vektorattacker mot end-to-end integriteten även fast det finns flera skyddslager. Mer specifikt visar vi hur en central katalogserver för public-keys gör end-to-end krypteringssystemet sårbart mot välkända operator-site man-in-the-middle-attacker. Trots att denna naiva typ av attack kan verka uppenbar, argumenterar vi för att (KakaoTalk) användare borde veta om styrkorna och svagheterna med en särskild systemdesign för att kunna göra ett informerat val för om de ska lita på säkerheten hos en chattapplikation eller inte.
|
524 |
Analyzing Secure and Attested Communication in Mobile DevicesMuhammad Ibrahim (19761798) 01 October 2024 (has links)
<p dir="ltr">To assess the security of mobile devices, I begin by identifying the key entities involved in their operation: the user, the mobile device, and the service or device being accessed. Users rely on mobile devices to interact with services and perform essential tasks. These devices act as gateways, enabling communication between the user and the back-end services. For example, a user may access their bank account via a banking app on their mobile device, which communicates with the bank’s back-end server. In such scenarios, the server must authenticate the user to ensure only authorized individuals can access sensitive information. However, beyond user authentication, it is crucial for connected services and devices to verify the integrity of the mobile device itself. A compromised mobile device can have severe consequences for both the user and the services involved.</p><p dir="ltr">My research focuses on examining the methods used by various entities to attest and verify the integrity of mobile devices. I conduct a comprehensive analysis of mobile device attestation from multiple perspectives. Specifically, I investigate how attestation is carried out by back-end servers of mobile apps, IoT devices controlled by mobile companion apps, and large language models (LLMs) accessed via mobile apps.</p><p dir="ltr">In the first case, back-end servers of mobile apps must attest to the integrity of the device to protect against tampered apps and devices, which could lead to financial loss, data breaches, or intellectual property theft. For instance, a music streaming service must implement strong security measures to verify the device’s integrity before transmitting sensitive content to prevent data leakage or unauthorized access.</p><p dir="ltr">In the second case, IoT devices must ensure they are communicating with legitimate companion apps running on attested mobile devices. Failure to enforce proper attestation for IoT companion apps can expose these devices to malicious attacks. An attacker could inject malicious code into an IoT device, potentially causing physical damage to the device or its surroundings, or even seizing control of the device, leading to critical safety risks, property damage, or harm to human lives.</p><p dir="ltr">Finally, in the third case, malicious apps can exploit prompt injection attacks against LLMs, leading to data leaks or unauthorized access to APIs and services offered by the LLM. These scenarios underscore the importance of secure and attested communication between mobile devices and the services they interact with.</p>
|
525 |
User controlled environmentPinninti, Ashish January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Mitchell L. Neilsen / The mobile world is rapidly changing: Smartphones have gone from portable messaging and email devices to streaming-video machines that surf the Web at blazing speed. Now-a-days a smartphone can provide computing capabilities, wireless communication capabilities, run software and perform other tasks just like any traditional computer. These amazing features of a smartphone and Open Source Android market helped in the development of this project. The purpose of this project is to develop an Android application for controlling various elements of user environment.
User Controlled Environment is an Android application for home. The environment consists of smart lights, an Android mobile devices for playing music and a display. The application sends the user’s preferred settings to the environment and the respective settings are applied. The preferences are displayed on the screen. The user will be able to view and adjust a variety of environmental preferences. The preferences include the light’s color, light intensity, and the music. When the user exits the application the environment goes to a default state. The users can set preferences which include moods, seven colors of light, three levels of light intensity and songs that the users can select.
|
526 |
KSUSoy YieldCalc: an innovative native Android app to estimate soybean yield before harvest using conventional approachBandyopadhyay, Tania January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Daniel Andresen / This report considers a native Android application called “KSUSoy YieldCalc” that assists in yield estimation of soybean before harvest following conventional approach. Android is one of the most popular installed base of any mobile platform, powering many mobile devices in more than 190 countries for users of diverse economic backgrounds, making it more popular than iOS devices (Android developers n.d.).The project “KSUSoy YieldCalc” adopted the Android platform as its base to serve farmers, agronomists, and consultants and deliver performance to save time and enhance farmers’ their confidence. The native application uses “conventional approach” of estimation of yield for calculations and eliminates the need for having Internet connection to access, thereby increasing the application’s flexibility. The project utilized Android Software Development Kit (SDK) as its development platform with extensive Java and Extensible Markup Language (XML) coding. The Department of Agronomy at Kansas State University (KSU) tested the application with promising results. Dr. Ignacio Ciampitti of the Department of Agronomy at KSU currently demonstrates the application to farmers. User feedback has been very satisfactory to date.
|
527 |
Auto profileAnumula, Srikar January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Daniel A. Andresen / Present times most of the applications allow users to set profiles and activate them manually. Also, there is no such application to alert the calling person automatically whenever we are busy in a meeting. Auto Profile is an application which addresses these issues. Using this application, a custom profile can be created and activated. The user of this application can create any number of custom profiles with their own timings depending on their requirements from the available set of ringer modes such as vibration, silent, normal modes. All these settings will be changed automatically when they define a profile and set it as active.
Every profile can be scheduled according to their wish. Also, users can define how often and how long they would like to activate the selected profile. Auto Profile Switcher will recognize their profile based on the current time and it will apply the right profile at the right time according to the given settings. For instance, they can save a home profile and a work profile, and the application will automatically switch from one to other automatically, without any user action. It's also possible for the users to apply manually saved profile wherever they are.
Also, the application allows users not to bother about the calls from important persons when they are in some important meeting or busy. Automatically profile is activated as scheduled and sends a respective alert to the caller according to the profile activated. Auto Profile application is user-friendly and easy to use.
The proposed application is developed for the android platform, which is used to create custom profiles and make sure that the tasks are executed as scheduled. This relieves users as they do not need to bother about the calls when they are in some important meeting or busy.
As this is a mobile application users can easily organize their action wherever they are with ease.
|
528 |
Towards automatic smartphone analysis for point-of-care microarray assaysErkers, Julia January 2016 (has links)
Poverty and long distances are two reasons why some people in the third world countries hasdifficulties seeking medical help. A solution to the long distances could be if the medical carewas more mobile and diagnostically tests could be performed on site in villages. A new pointof-care test based on a small blood shows promising results both in run time and mobility.However, the method still needs more advanced equipment for analysis of the resultingmicroarray. This study has investigated the potential to perform the analysis within asmartphone application, performing all steps from image capturing to a diagnostic result. Theproject was approach in two steps, starting with implementation and selection of imageanalysis methods and finishing with implementing those results into an Android application.A final application was not developed, but the results gained from this project indicates that asmartphone processing power is enough to perform heavy image analysis within a sufficientamount of time. It also imply that the resolution in the evaluated images taken with a Nexus 6together with an external macro lens most likely is enough for the whole analysis, but furtherwork must be done to ensure it.
|
529 |
HappyHelper : Get it done!Eriksson, Mikaela, Normark, Anna, Oskarsson, Rebecca January 2016 (has links)
The aim of this project is to develop an application with the purpose to help students procrastinate less and plan their studies. Cellphones are a common distraction among students today and many people find procrastination on cellphones to be a major problem. The purpose of the application is to prevent procrastination and stress by turning off distractive apps during a study session as well as offering the user help in planning upcoming deadlines and examinations. The application HappyHelper provides the user features such as blocking distracting application during a certain amount of time and a calendar for organizing studies; consequently, the aim of the project is achieved. To determine whether the purpose is fulfilled or not a user survey is required and is scheduled to be executed in the near future. / Målet med detta projekt är att utveckla en applikation med syfte att hjälpa studenter prokrastinera mindre och planera sina studier. Att distraheras av mobiltelefonen är ett vanligt problem bland studenter idag och många ser prokrastineringen med en mobiltelefon som ett allvarligt bekymmer. Applikationens syfte är att motverka prokrastinering och stress genom att stänga av distraherande appar under en studiesession och erbjuda användaren att planera in arbeten och examinationer. Applikationen HappyHelper erbjuder användaren att under en tidsinställd period blockera distraherande applikationer och en kalenderfunktion för att planera in sina studier; projektet uppnår därmed sitt mål. För att avgöra huruvida syftet är uppfyllt eller inte, krävs en användarundersökning som är planerad att genomföras in en snar framtid.
|
530 |
Σχεδίαση και αξιολόγηση χωρο-ευαίσθητης εφαρμογής σε συσκευή AndroidΔιαμαντής, Βασίλειος 20 February 2014 (has links)
Η παρούσα διπλωματική εργασία πραγματεύεται ένα παιχνίδι πολλών παικτών που παίζεται με συσκευές Android στην πόλη της Πάτρας. Το όνομα του παιχνιδιού είναι "Αόρατη Πόλη". / This thesis describes the development of a multiplayer game in android platform played in the city of Patras. The name of the game is "Invisible City".
|
Page generated in 0.035 seconds