scholarly journals Content Analyzer for Information Leakage Detedction and Prevention in Android Smart Devices: A Conceptual Approach.

Author(s):  
T Okebule ◽  
◽  
O.A. Adeyemo ◽  
K.A. Olatunji ◽  
A.S Awe

The advent of android operating system introduced tools to keep track of users’ information activities and prevent information leakage which bridged the trust between application developers and consumers. Literature shows that several phenomena had been developed to prevent malicious applications from stealing personal sensitive information from smart phones but there is still the need for efficient solutions. This study proposes a conceptual approach for the development of a contentAnalyzer for information leakage detection and prevention on android-based devices. The concept will help to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks. The proposed concept combines both static and dynamic analysis, and if implemented will improve checking through the codes in the file activities and vulnerabilities that could be a problem. Keywords: Android, ContentAnalyzer, Static Analysis, Dynamic Analysis, Information leakage, Information leakage detection, Information leakage Prevention.

2018 ◽  
Vol 7 (1.7) ◽  
pp. 230 ◽  
Author(s):  
B. Raja Koti ◽  
G.V.S. Raj Kumar

The Digital world is advancing in terms of technological development day by day, resulting in an instantaneous rise in Data. This massive amount of Data has introduced the thought of Big Data, which has attracted both the business and IT sectors leaving the scope for huge opportunities. In turn, securing this massive data has become a challenging issue in the field of Information and Communication Technology. In this paper, we have carried out the work on business information sharing data which contains some sensitive information to investigate the security challenges of data in the field of business communication. The article an attempt is also made to identify the user’s intention or behavior during the navigation of data. The greatest challenge that is associated here is to prevent the integrity of the data while sharing the data from organization to the third party, where there exist huge chances of data loss, leakages or alteration. This paper highlights the concepts of data leakage, the techniques to detect the data leakage and the process of protecting the leaked data based on encrypted form.


2014 ◽  
Vol 577 ◽  
pp. 852-855
Author(s):  
Jing Qiu ◽  
Xiao Hong Su ◽  
Pei Jun Ma

We present a new approach for disassembling executables with self-modifying code. Self-modifying code is very common in malware. Conventional static or dynamic approaches cannot handle self-modifying code very well. We combine static and dynamic analysis to fight against self-modifying code with the multiple-path exploration technique. The evaluation results indicate that our approach works well in disassembling executables with self-modifying code with high precision and code coverage compared with the state-of-art disassembler.


Author(s):  
S. K. Singh ◽  
A. Banerjee ◽  
R. K. Varma ◽  
S. Adhikari ◽  
S. Das

2018 ◽  
Vol 18 (02) ◽  
pp. 1850017 ◽  
Author(s):  
Iwona Adamiec-Wójcik ◽  
Łukasz Drąg ◽  
Stanisław Wojciech

The static and dynamic analysis of slender systems, which in this paper comprise lines and flexible links of manipulators, requires large deformations to be taken into consideration. This paper presents a modification of the rigid finite element method which enables modeling of such systems to include bending, torsional and longitudinal flexibility. In the formulation used, the elements into which the link is divided have seven DOFs. These describe the position of a chosen point, the extension of the element, and its orientation by means of the Euler angles Z[Formula: see text]Y[Formula: see text]X[Formula: see text]. Elements are connected by means of geometrical constraint equations. A compact algorithm for formulating and integrating the equations of motion is given. Models and programs are verified by comparing the results to those obtained by analytical solution and those from the finite element method. Finally, they are used to solve a benchmark problem encountered in nonlinear dynamic analysis of multibody systems.


2002 ◽  
Vol 72 (6-7) ◽  
pp. 483-497 ◽  
Author(s):  
K. G. Tsepoura ◽  
S. Papargyri-Beskou ◽  
D. Polyzos ◽  
D. E. Beskos

2009 ◽  
Vol 2 (1/2/3/4/5/6) ◽  
pp. 251 ◽  
Author(s):  
K. Prabhakaran Nair ◽  
Mohammed Shabbir Ahmed ◽  
Saed Thamer Al qahtani

Sign in / Sign up

Export Citation Format

Share Document