Operating System Kernel Data Disambiguation to Support Security Analysis

Author(s):  
Amani S. Ibrahim ◽  
John Grundy ◽  
James Hamlyn-Harris ◽  
Mohamed Almorsy
2018 ◽  
Vol 67 (4) ◽  
pp. 183-194
Author(s):  
Kamil Kaczyński ◽  
Jerzy Gawinecki

Telegram and Viber are the most popular mobile messengers nowadays. Unlike other products, such as WhatsApp or Facebook Messenger, these messengers allow their users to restrict access to messages stored on the device − in Telegram it is access protection using a PIN code, in the Viber there is hidden chat functionality, also protected with a PIN code. This article presents a practical attack that allows to bypass the security functionalities implemented by the developers of both solutions. The paper presents the methods to increase the security of the mentioned software in a way that it can be implemented in the Android operating system. Keywords: Telegram, Viber, cryptography, Android, instant messenger.


2015 ◽  
Vol 13 (35) ◽  
pp. 89-102 ◽  
Author(s):  
Sebastián Londoño ◽  
Christian Urcuqui ◽  
Manuel Fuentes Amaya ◽  
Johan Gómez ◽  
Andrés Navarro Cadavid

Android is an operating system which currently has over one billion active users for all their mobile devices, a market impact that is influencing an increase in the amount of information that can be obtained from different users, facts that have motivated the development of malicious software by cybercriminals. To solve the problems caused by malware, Android implements a different architecture and security controls, such as a unique user ID (UID) for each application, while an API permits its distribution platform, Google Play applications. It has been shown that there are ways to violate that protection, so the developer community has been developing alternatives aimed at improving the level of safety. This paper presents: the latest information on the various trends and security solutions for Android, and SafeCandy, an app proposed as a new system for analysis, validation and configuration of Android applications that implements static and dynamic analysis with improved ASEF. Finally, a study is included to evaluate the effectiveness in threat detection of different malware antivirus software for Android.


2014 ◽  
Vol 998-999 ◽  
pp. 1274-1277
Author(s):  
Yong Jun Cui ◽  
Yong Hua Zhang

This article argues that in terms of security flaws Linux operating system. On this basis, it focuses on improving Linux security in two ways, one is the use and management of Linux from a security point of view, the second is upgrading the system, and improves their security thoroughly.


2013 ◽  
Vol 816-817 ◽  
pp. 1032-1036
Author(s):  
Juan Xiao ◽  
Juan Wu

To improve the security and reliability of Chip Operating System,A Chip Operating System supporting SM2 algorithm is designed and implemented on smart card chip of Tongfang THD86.The system shows better performance and efficiency on security. The experimental results and the security analysis showed SM2 algorithm had advantages of taking up less memory space and higher efficient on encryption and signature than RSA algorithm.The COS passed the tests of State Cryptography Administration, it was valuable and effective.


Author(s):  
E. Wisse ◽  
A. Geerts ◽  
R.B. De Zanger

The slowscan and TV signal of the Philips SEM 505 and the signal of a TV camera attached to a Leitz fluorescent microscope, were digitized by the data acquisition processor of a Masscomp 5520S computer, which is based on a 16.7 MHz 68020 CPU with 10 Mb RAM memory, a graphics processor with two frame buffers for images with 8 bit / 256 grey values, a high definition (HD) monitor (910 × 1150), two hard disks (70 and 663 Mb) and a 60 Mb tape drive. The system is equipped with Imaging Technology video digitizing boards: analog I/O, an ALU, and two memory mapped frame buffers for TV images of the IP 512 series. The Masscomp computer has an ethernet connection to other computers, such as a Vax PDP 11/785, and a Sun 368i with a 327 Mb hard disk and a SCSI interface to an Exabyte 2.3 Gb helical scan tape drive. The operating system for these computers is based on different versions of Unix, such as RTU 4.1 (including NFS) on the acquisition computer, bsd 4.3 for the Vax, and Sun OS 4.0.1 for the Sun (with NFS).


Sign in / Sign up

Export Citation Format

Share Document