scholarly journals DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability

Author(s):  
Min Zheng ◽  
Mingshen Sun ◽  
John C.S. Lui
2020 ◽  
Vol 10 (15) ◽  
pp. 5367 ◽  
Author(s):  
Mohamed N. Lotfy ◽  
Yasser A. Khalifa ◽  
Abdelrahim K. Dessouki ◽  
Elsayed Fathallah

The most important problems confronted by designers of floating structures are minimizing weight and increasing payload to get proper resistance to the applied loads. In the present study, the structural performance of a ferry is analyzed using both metallic and composite materials as a result of the dynamic load of the Military Load Capacity (MLC) 70 (tank load). The model is composed of sixteen floating pontoons. Finite element simulation and dynamic analysis were performed using ANSYS software (analysis system software), considering a moving MLC70 (tank load). Both concentric and eccentric cases of loading are considered. Draft, deformation, and stresses are obtained and investigated. For the steel ferry, the von-Mises stresses are investigated, while for the composite ferry, the maximum principal stresses are investigated. Furthermore, buckling analysis is performed on the composite ferry and the buckling load factor is determined. The results of the dynamic analysis illustrated that the transverse eccentricity of the moving tank MLC70 must not exceed 0.5 m for a steel ferry while it may reach up to 1.5 m for the composite ferry. This research can also be a useful tool in the design of floating composite and steel ferries.


SIMULATION ◽  
1984 ◽  
Vol 42 (1) ◽  
pp. 37-37
Author(s):  
Ron Hammond

Author(s):  
Rie SAYAMA ◽  
Takatoshi UMENO ◽  
Takeshi SHIMOTO ◽  
Hidehiko HIGAKI ◽  
Yoshitaka NAKANISHI ◽  
...  

2013 ◽  
Vol 756-759 ◽  
pp. 2220-2225 ◽  
Author(s):  
Luo Xu Min ◽  
Qing Hua Cao

The most serious threats for Android users is come from application, However, the market lack a mechanism to validate whether these applications are malware or not. So, malware maybe leak users private information, malicious deductions for send premium SMS, get root privilege of the Android system and so on. In the traditional method of malware detection, signature is the only basis. It is far enough. In this paper, we propose a runtime-based behavior dynamic analysis for Android malware detection. The new scheme can be implemented as a system. We analyze 350 applications come from third-party Android market, the result show that our system can effectively detect unknown malware and the malicious behavior of malware.


Sign in / Sign up

Export Citation Format

Share Document