Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface

Author(s):  
Petr Gallus ◽  
Petr Frantis
2018 ◽  
Vol 67 (4) ◽  
pp. 183-194
Author(s):  
Kamil Kaczyński ◽  
Jerzy Gawinecki

Telegram and Viber are the most popular mobile messengers nowadays. Unlike other products, such as WhatsApp or Facebook Messenger, these messengers allow their users to restrict access to messages stored on the device − in Telegram it is access protection using a PIN code, in the Viber there is hidden chat functionality, also protected with a PIN code. This article presents a practical attack that allows to bypass the security functionalities implemented by the developers of both solutions. The paper presents the methods to increase the security of the mentioned software in a way that it can be implemented in the Android operating system. Keywords: Telegram, Viber, cryptography, Android, instant messenger.


2015 ◽  
Vol 13 (35) ◽  
pp. 89-102 ◽  
Author(s):  
Sebastián Londoño ◽  
Christian Urcuqui ◽  
Manuel Fuentes Amaya ◽  
Johan Gómez ◽  
Andrés Navarro Cadavid

Android is an operating system which currently has over one billion active users for all their mobile devices, a market impact that is influencing an increase in the amount of information that can be obtained from different users, facts that have motivated the development of malicious software by cybercriminals. To solve the problems caused by malware, Android implements a different architecture and security controls, such as a unique user ID (UID) for each application, while an API permits its distribution platform, Google Play applications. It has been shown that there are ways to violate that protection, so the developer community has been developing alternatives aimed at improving the level of safety. This paper presents: the latest information on the various trends and security solutions for Android, and SafeCandy, an app proposed as a new system for analysis, validation and configuration of Android applications that implements static and dynamic analysis with improved ASEF. Finally, a study is included to evaluate the effectiveness in threat detection of different malware antivirus software for Android.


Author(s):  
Amani S. Ibrahim ◽  
John Grundy ◽  
James Hamlyn-Harris ◽  
Mohamed Almorsy

Author(s):  
Suchita Kamble ◽  
N. N. Mhala

The continuing advances in the performance of network servers make it essential for network interface cards (NICs) to provide more sophisticated services and data processing. Modern network interfaces provide fixed functionality and are optimized for sending and receiving large packets. Network interface cards allow the operating system to send and receive packets through the main memory to the network. The operating system stores and retrieves data from the main memory and communicates with the NIC over the local interconnect, usually a peripheral component interconnect bus (PCI). Most NICs have a PCI hardware interface to the host server, use a device driver to communicate with the operating system and use local receive and transmit storage buffers. NICs typically have a direct memory access (DMA) engine to transfer data between host memory and the network interface memory. In addition, NICs include a medium access control (MAC) unit to implement the link level protocol for the underlying network such as Ethernet, and use a signal processing hardware to implement the physical (PHY) layer defined in the network. To execute and synchronize the above operations NICs also contents controller whose architecture is customized for network data transfer. In this paper we present the architecture of application specific controller that can be used in NICs.


2014 ◽  
Vol 998-999 ◽  
pp. 1274-1277
Author(s):  
Yong Jun Cui ◽  
Yong Hua Zhang

This article argues that in terms of security flaws Linux operating system. On this basis, it focuses on improving Linux security in two ways, one is the use and management of Linux from a security point of view, the second is upgrading the system, and improves their security thoroughly.


2014 ◽  
Vol 556-562 ◽  
pp. 6038-6041
Author(s):  
Fu Yang Xia

The solution of Ethernet interface based on the core of ATmega128 and its architecture of hardware was illustrated in this paper. The operating system of μC/OS-II was transplanted to the system and the improvement of TCP/IP protocol was implemented. The paper dwelled on the module structure of TCP protocol which based on message and function of μC/OS-II. Finally, the test of systemic performance was presented.


2010 ◽  
Vol 10 (9) ◽  
pp. 1495-1507 ◽  
Author(s):  
Alan Richard Wilson ◽  
Peter Stephen Vincent

Sign in / Sign up

Export Citation Format

Share Document