scholarly journals Energy management in mobile devices with the cinder operating system

Author(s):  
Arjun Roy ◽  
Stephen M. Rumble ◽  
Ryan Stutsman ◽  
Philip Levis ◽  
David Mazières ◽  
...  
2022 ◽  
Vol 18 (2) ◽  
pp. 1-28
Author(s):  
Xiaoyu Ji ◽  
Yushi Cheng ◽  
Juchuan Zhang ◽  
Yuehan Chi ◽  
Wenyuan Xu ◽  
...  

With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally measured device fingerprints, such as device ID, software or hardware-based characteristics. In this article, we propose DeMiCPU , a stimulation-response-based device fingerprinting technique that relies on externally measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power-supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.7% precision and recall on average, and 99.8% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6~s. The performance can be further improved to 99.9% with multi-round fingerprinting. In addition, we implement a prototype of DeMiCPU docker, which can effectively reduce the requirement of test points and enlarge the fingerprinting area.


Author(s):  
Ewa Janczukowicz ◽  
Ahmed Bouabdallah ◽  
Arnaud Braud ◽  
Stéphane Tuffin ◽  
Jean-Marie Bonnin

Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and furthermore, it wants to redefine the way payments work for mobile applications. Firefox OS is not directly competing with Android and iOS, although it has some common target markets with Android. It could be an opportunity to weaken the iOS and Android duopoly. For now it targets users that don't have smartphones yet and is mostly used on low-end devices. The biggest challenge of Firefox OS is to assure a stable position in the mobile OS ecosystem and to get a large volume of users. Mozilla has an ambition to improve the web and make the web the platform. However developing the Firefox OS and ensuring its important place on the market is difficult because of technological and business limits that will be discussed in this chapter.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2802 ◽  
Author(s):  
Qurat-ul Ain ◽  
Sohail Iqbal ◽  
Safdar Khan ◽  
Asad Malik ◽  
Iftikhar Ahmad ◽  
...  

Energy consumption in the residential sector is 25% of all the sectors. The advent of smart appliances and intelligent sensors have increased the realization of home energy management systems. Acquiring balance between energy consumption and user comfort is in the spotlight when the performance of the smart home is evaluated. Appliances of heating, ventilation and air conditioning constitute up to 64% of energy consumption in residential buildings. A number of research works have shown that fuzzy logic system integrated with other techniques is used with the main objective of energy consumption minimization. However, user comfort is often sacrificed in these techniques. In this paper, we have proposed a Fuzzy Inference System (FIS) that uses humidity as an additional input parameter in order to maintain the thermostat set-points according to user comfort. Additionally, we have used indoor room temperature variation as a feedback to proposed FIS in order to get the better energy consumption. As the number of rules increase, the task of defining them in FIS becomes time consuming and eventually increases the chance of manual errors. We have also proposed the automatic rule base generation using the combinatorial method. The proposed techniques are evaluated using Mamdani FIS and Sugeno FIS. The proposed method provides a flexible and energy efficient decision-making system that maintains the user thermal comfort with the help of intelligent sensors. The proposed FIS system requires less memory and low processing power along with the use of sensors, making it possible to be used in the IoT operating system e.g., RIOT. Simulation results validate that the proposed technique reduces energy consumption by 28%.


2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.


Sign in / Sign up

Export Citation Format

Share Document