ipshield: A Framework For Enforcing Context-Aware Privacy

Size: px
Start display at page:

Download "ipshield: A Framework For Enforcing Context-Aware Privacy"

Transcription

1 ipshield: A Framework For Enforcing Context-Aware Privacy Supriyo Chakraborty, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, Mani Srivastava

2 2 From sensor data to inferences Sensor Data

3 2 From sensor data to inferences Apps Sensor Data

4 2 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensor Data

5 2 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensor Data Sensitive Location Password Media habits Physiological habits

6 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits

7 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits

8 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits

9 3 From sensor data to inferences Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Sensitive Sensor Data Location Password Media habits Physiological habits

10 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist

11 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Inference firewall Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist

12 4 Protecting inference privacy while providing utility Apps Inferences Utility Providing Fitness mhealth Lifelogging Phone operation Whitelist Inference firewall Sensitive Sensor Data Location Password Media habits Physiological habits Blacklist

13 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing Sensor Data Capture Data Processing Sensor Data Capture Data Processing D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} 5

14 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing 1. K-anonymity 2. L-Diversity 3. t-closeness Privacy M=<P,Q,V> inference = identity Information Recipient Sensor Data Capture Data Processing Sensor Data Capture Data Processing D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} 5

15 Prior notions of privacy in databases Population Scale Database Sensor Data Capture Data Processing 1. K-anonymity 2. L-Diversity 3. t-closeness Privacy M=<P,Q,V> inference = identity Information Recipient Sensor Data Capture Data Processing Privacy M=R(<P,Q,V>)+noise Sensor Data Capture Data Processing Information Recipient D := { P = personal identifiers, (name, ID) Q = quasi identifiers, (age, zip code) V = measurement values (sensor data)} Differential Privacy inference = membership 5

16 6 Prior notions of privacy in databases Sensor Data Capture Data Processing Aggregate Queries M:=<P, Q, V > Information Recipient Sensor Data Capture Data Processing Sharing an Individual s data Information Recipient

17 6 Prior notions of privacy in databases Privacy of Data (secrecy) Privacy of Identity (anonymity) Sensor Data Capture Data Processing Traditional Aggregate Queries M:=<P, Q, V > Information Recipient Sensor Data Capture Data Processing Sharing an Individual s data Information Recipient Privacy of Behavior

18 7 Controls provided by current systems are insufficient Android Manifest Binary Policies

19 7 Controls provided by current systems are insufficient pdroid Static Policies

20 7 Controls provided by current systems are insufficient ProtectMyPrivacy Share Random Data

21 8 Design requirements of ipshield Unrestricted Access Protected APIs

22 8 Design requirements of ipshield Combination of benign sensors can be used for privacy attack Sensor Monitoring Unrestricted Access Protected APIs

23 9 Design requirements of ipshield Sensor Monitoring GPS Network Accelerometer Microphone Light

24 9 Design requirements of ipshield Sensor Monitoring GPS Network Accelerometer Location Transportation Mode Password/PIN Privacy Abstraction Microphone Stress Light Media Watching

25 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Enforcement

26 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Rule Recommender Privacy Rules on Sensors Rule Enforcement

27 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Recommender Manual Override (Rules) Rule Enforcement

28 10 Design requirements of ipshield User Privacy Preferences Sensor Monitoring Privacy Abstraction Whitelist/Blacklist Translation Algorithms Privacy Rules on Sensors Rule Recommender Manual Override (Rules) ipshield Rule Enforcement Rule Enforcement

29 Whitelist/Blacklist Rule Recommender Privacy rules on sensors

30 Recommender objective Generate a plan for context-aware obfuscation of sensor data depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. 12

31 Divide-and-conquer strategy Recommend a plan containing allow/deny rules for sensors depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. 13

32 Divide-and-conquer strategy Recommend a plan containing allow/deny rules for sensors depending on the prioritized whitelist and blacklist such that accuracy of whitelist is maximized and accuracy of blacklist is minimized. + Support manual override/configuration of fine-grained context-aware rules 13

33 Elements of the problem: accuracy 14

34 14 Elements of the problem: accuracy Activity Location OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

35 14 Elements of the problem: accuracy Activity Location OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

36 14 Elements of the problem: accuracy Activity Inference Location Type OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

37 14 Elements of the problem: accuracy Activity Inference Location Type OnScreen Taps Inference Database (A) GPS+Acc+Gyro 95% 97% 80% Sensor Combination Accuracy of Prediction GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

38 15 Elements of the problem: priority Priority (p) Priority =(p activity,p location,p tap ) priority = {10, 4, 10}

39 15 Elements of the problem: priority Priority (p) Priority =(p activity,p location,p tap ) priority = {10, 4, 10} Whitelisted inferences priority allow whitelisted inferences Blacklisted inferences priority block blacklisted inferences

40 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination

41 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations

42 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and

43 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and minimize accuracy of prioritized blacklist

44 16 Rule recommender in ipshield X max 22 N l2w A(,l)2 p l X l2b A(,l)2 p l s.t. X l2b,p l =p max A(,l)=0 W =whitelist,b = blacklist, p l = priority, and = Sensor combination Over all sensor combinations maximize accuracy of prioritized whitelist and minimize accuracy of prioritized blacklist such that highest priority blacklists are always blocked.

45 17 Rule recommender at work Activity Location OnScreen Taps GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

46 17 Rule recommender at work Activity Location OnScreen Taps GPS+Acc+Gyro 95% 97% 80% GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

47 17 Rule recommender at work Activity Location OnScreen Taps Priority1 {10, 4, 10} GPS+Acc+Gyro 95% 97% 80% 0 GPS+WiFi 83.1% 97% 0% GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

48 17 Rule recommender at work Activity Location OnScreen Taps Priority1 {10, 4, 10} GPS+Acc+Gyro 95% 97% 80% 0 GPS+WiFi 83.1% 97% 0% Allow GPS+GSM 81.7% 98.2% 0% GSM+WiFi 72.9% 94.03% 0%

49 ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Enforcement Prototype implementation on Android

50 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes

51 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes

52 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes

53 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Sensor Data Android Framework Location Manager Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes

54 19 Sensor subsystem in android and data interception Third Party Apps Sensor Manager Android Framework Location Manager }App and Managers run as part of the same process Sensor Data Sensor Data Sensor Service LocationManager Service System Server Android Native/Linux Kernel Hardware System Processes User Processes

55 19 Sensor subsystem in android and data interception Sensor Manager Sensor Data Sensor Service Third Party Apps Android Framework System Server Android Native/Linux Kernel Hardware Location Manager Sensor Data LocationManager Service }App and Managers run as part of the same process } Services run in separate system owned processes System Processes User Processes

56 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Monitoring Privacy Abstraction Rule Recommender Sensor Manager Location Manager Fine-grained Rules Enforcement SensorService LocationManager Service System Processes System Server Native Runtime Hardware User Processes Trusted App (User Process)

57 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)

58 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Inference Database Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)

59 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Semantic Firewall Configurator Monitoring Privacy Abstraction Rule Recommender Inference Database Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)

60 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Context Engine Direct Configurator Semantic Firewall Configurator Rule Recommender Inference Database Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService FirewallConfig Service LocationManager Service System Server Native Runtime Hardware System Processes User Processes Trusted App (User Process)

61 20 Implementing ipshield Trusted App part of ipshield Whitelist and Blacklist of inference ipshield Context Engine Direct Configurator Semantic Firewall Configurator Rule Recommender Inference Database Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules Sensor Manager FirewallConfig Manager Location Manager Enforcement SensorService Obfuscator FirewallConfig Service System Server LocationManager Service Obfuscator Native Runtime Hardware System Processes User Processes Trusted App (User Process)

62 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules

63 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules

64 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Suppress Fine-grained Rules

65 21 User interaction with ipshield ipshield Monitoring Privacy Abstraction Rule Recommender Fine-grained Rules

66 Feasibility of running ipshield on mobile platforms Time (in secs) time to load rules into memory time for the rules to take effect # rules 22

67 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) time to load rules into memory time for the rules to take effect # rules 22

68 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) SENSOR_DELAY _GAME time to load rules into memory time for the rules to take effect # rules 22

69 Feasibility of running ipshield on mobile platforms 0.1 SENSOR_DELAY_NORMAL, SENSOR_DELAY_UI Time (in secs) SENSOR_DELAY _GAME SENSOR_DELAY _FASTEST time to load rules into memory time for the rules to take effect # rules 22

70 23 Feasibility of running ipshield on mobile platforms 26.7 Memory (in MB) AOSP Passthrough Constant Perturb Suppress

71 23 Feasibility of running ipshield on mobile platforms 26.7 Memory (in MB) AOSP Passthrough Constant Perturb Suppress

72 24 Concluding Remarks We designed and implemented ipshield which - proposes the use of inferences as the currency for privacy and utility specification. - advocates that the burden of configuring fine-grained privacy rules should be shifted from the user to the system. - provides insight into how and what data is being used by apps and better visibility into potential risks and consequences of sharing data. Going forward we want to... - develop the rule recommender to generate rules for obfuscating data. - augment ipshield with ability to perform static analysis of app code to better understand the risks presented by the apps. - allow crowd-sourcing for bootstrapping of rules. ipshield can be downloaded at

73 Thank You 25

74 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type

75 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type

76 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type

77 26 Rules supported Rule ipshield Monitoring Privacy Abstraction Contexts SensorType Action Rule Recommender Fine-grained Rules Built-In External Enforcement Normal Constant Suppress Perturb Play-back Time Place App Day OfDay NameOfWeek Scalar Vector Distribution Name Distribution Param Walking Running... Sensor Sensor Sensor Source Source Type

78 ipshield Rules supported Monitoring Rule Contexts SensorType Privacy Abstraction Actual trace Spoofed trace Rule Recommender Action Fine-grained Rules Built-In Bar External Normal Constant Suppress Perturb Scalar Time Place App Day NameOfWeek OfDay Walking Running Vector Play-back Classroom Distribution Distribution Name Param... Classroom Enforcement Sensor Friend s Sensor SensorSource Source Home Type Friend s Home Starbucks Bar Restaurant My Home My Home Rule: If ((TimeOfDay in [12am-11:59pm]) and (Place=Bar) and (AppName=Saga) then apply action = Constant and Value = Restaurant on SensorType = GPS; 26

79 27 Sensor usage for apps % of apps # sensors

80 28 Distribution of sensors by type Accelerometer GPS Microphone WiFi Soft Sensors Bluetooth Gyroscope Cellular Camera Others % of apps

u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc.

u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc. November 11, 2013 Presented by: Merhawit Habte 1. Introduc,on u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections,

More information

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime Jianmeng Huang 2017,1,12 Outline 1 Motivation Intro Current solutions Our goals 2 SieveDroid Our solution

More information

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many

More information

NESL. CAreDroid: Adaptation Framework for Android Context-Aware Applications. Salma Elmalaki Lucas Wanner Mani Srivastava

NESL. CAreDroid: Adaptation Framework for Android Context-Aware Applications. Salma Elmalaki Lucas Wanner Mani Srivastava CAreDroid: Adaptation Framework for Android Context-Aware Applications Salma Elmalaki Lucas Wanner Mani Srivastava 1 Isolated Disconnected Unaware Photo Courtesy: Student Portal 2 Computing From Isolation

More information

Barracuda Cloud Archiving Service Mobile Application for Android

Barracuda Cloud Archiving Service Mobile Application for Android Barracuda Cloud Archiving Service Mobile Application for Android Requirements: Latest Android Message Archive application available for download from the Google Play Store. Android device running software

More information

Public Sensing Using Your Mobile Phone for Crowd Sourcing

Public Sensing Using Your Mobile Phone for Crowd Sourcing Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Public Sensing Using Your Mobile Phone for Crowd Sourcing 55th Photogrammetric Week September 10, 2015 Stuttgart,

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Beam: Ending Monolithic Applications for Connected Devices

Beam: Ending Monolithic Applications for Connected Devices Beam: Ending Monolithic Applications for Connected Devices Chenguang Shen (UCLA) Rayman Preet Singh (Univ. of Waterloo/Samsung Research) Amar Phanishayee, Aman Kansal, Ratul Mahajan (Microsoft Research)

More information

Sony develops transparent lens eyewear SmartEyeglass - Announces availability of software development kit -

Sony develops transparent lens eyewear SmartEyeglass - Announces availability of software development kit - News & Information 1-7-1 Konan, Minato-ku, Tokyo 108-0075, Japan Sony Corporation No. 14-090E September 19, 2014 Sony develops transparent lens eyewear SmartEyeglass - Announces availability of software

More information

ECE 1160/2160 Embedded Systems Design. Projects and Demos. Wei Gao. ECE 1160/2160 Embedded Systems Design

ECE 1160/2160 Embedded Systems Design. Projects and Demos. Wei Gao. ECE 1160/2160 Embedded Systems Design ECE 1160/2160 Embedded Systems Design Projects and Demos Wei Gao ECE 1160/2160 Embedded Systems Design 1 Project Group project 45% Proposal presentation 5% Midterm presentation/demo 10% Final presentation/demo

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

Mobile and Ubiquitous Computing: Mobile Sensing

Mobile and Ubiquitous Computing: Mobile Sensing Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,

More information

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY?

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in

More information

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,

More information

PRISM: Platform for Remote Sensing using Smartphones

PRISM: Platform for Remote Sensing using Smartphones PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA

More information

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify Tizen apps with 1 Context Awareness, powered by AI by Shashwat Pradhan, CEO Emberify Introduction Context refers to information that characterizes a situation, between: Apps People Surrounding environment

More information

Contextion: A Framework for Developing Context-Aware Mobile Applications

Contextion: A Framework for Developing Context-Aware Mobile Applications Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract

More information

Fusing Sensors into Mobile Operating Systems & Innovative Use Cases

Fusing Sensors into Mobile Operating Systems & Innovative Use Cases Fusing Sensors into Mobile Operating Systems & Innovative Use Cases May 23, 2012 Tristan Joo (tristanjoo@wca.org) Board Director & Co-Chair of Mobile SIG Wireless Communications Alliance, Independent Executive

More information

BlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices.

BlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices. BlackBerry 10.2.1 BlackBerry 10 OS, version 10.2.1 continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices. PINCH TO PRIORITIZE Don t miss important messages Pinch the Hub to

More information

STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION

STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION Maryam Mehrnezhad Ehsan Toreini Siamak F. Shahandashti Feng Hao Newcastle University, UK At EuroUSEC, July 2016 JavaScript-based attack

More information

DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior

DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior http://defdroid.org DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Peng (Ryan) Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou UC San Diego Growing number of (novice) app developers

More information

Sense & Sensibility for Wireless Networks. Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari

Sense & Sensibility for Wireless Networks. Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari Sense & Sensibility for Wireless Networks Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari The Era of Truly Mobile Computing 2000 Internet Users (Millions) 1600 1200 800 400

More information

RAD Studio XE4 in Action LIVE! 14th May, 2013 Taipei Malcolm Groves

RAD Studio XE4 in Action LIVE! 14th May, 2013 Taipei Malcolm Groves RAD Studio XE4 in Action LIVE! 14th May, 2013 Taipei Malcolm Groves Embarcadero Technologies Founded 1993 3.2 Million Customers 500+ Employees in 29 Countries 5 R&D Centers of Excellence World Wide Sales

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Tale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS

Tale of a mobile application ruining the security of global solution because of a broken API design. SIGS Geneva 21/09/2016 Jérémy MATOS Tale of a mobile application ruining the security of global solution because of a broken API design SIGS Geneva 21/09/2016 Jérémy MATOS whois securingapps Developer background Spent last 10 years working

More information

Privacy by Design in an IoT Environment. Alfred Kobsa

Privacy by Design in an IoT Environment. Alfred Kobsa Privacy by Design in an IoT Environment Alfred Kobsa D o n a l d B re n S c h o o l o f I n fo r m at i o n a n d C o m p u te r S c i e n c e s U n i ve rs i t y o f C a l i fo r n i a, I r v i n e DARPA

More information

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Analysis of Privacy and Security Exposure in Mobile Dating Applications

Analysis of Privacy and Security Exposure in Mobile Dating Applications Analysis of Privacy and Security Exposure in Mobile Dating Applications Constantinos Patsakis, Athanasios Zigomitros and Agusti Solanas International Conference on Mobile, Secure and Programmable Networking

More information

AAD - ASSET AND ANOMALY DETECTION DATASHEET

AAD - ASSET AND ANOMALY DETECTION DATASHEET 21 October 2018 AAD - ASSET AND ANOMALY DETECTION DATASHEET Meaningful Insights with Zero System Impact Classification: [Protected] 2018 Check Point Software Technologies Ltd. All rights reserved. This

More information

Mobile Computing Meets Research Data

Mobile Computing Meets Research Data Mobile Computing Meets Research Data Engineer Bainomugisha Pilot Research Data Center Workshop Mombasa/Kenya Software Languages Lab. Department of Computer Science Vrije Universiteit Brussel, Belgium Department

More information

Ad Hoc Networks - Applications and System Design

Ad Hoc Networks - Applications and System Design Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,

More information

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University

Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University Data Analytics for IoT: Applications to Security and Privacy Nick Feamster Princeton University Growing Market for IoT Analytics More than 25 billion devices by 2020 Each of these devices generates data.

More information

6.S062: Mobile and Sensor Computing aka IoT Systems

6.S062: Mobile and Sensor Computing aka IoT Systems 6.S062: Mobile and Sensor Computing aka IoT Systems http://6s062.github.io/6mob Lecturers Hari Balakrishnan (hari@csail.mit.edu) Fadel Adib (fadel@mit.edu) TA Hyunjoon (Richard) Song (rsong@mit.edu) Course

More information

Managing and Optimising for numerous Android Devices

Managing and Optimising for numerous Android Devices Managing and Optimising for numerous Android Devices Hello Andrew Innes Old-school console developer Android fanboi Works for Unity Japan Console R&D Support Manager Unitron Dog-fooding Unity s 2D pipeline

More information

Android. Lesson 1. Introduction. Android Developer Fundamentals. Android Developer Fundamentals. to Android 1

Android. Lesson 1. Introduction. Android Developer Fundamentals. Android Developer Fundamentals. to Android 1 Android Lesson 1 1 1 1.0 to Android 2 Contents Android is an ecosystem Android platform architecture Android Versions Challenges of Android app development App fundamentals 3 Android Ecosystem 4 What is

More information

Imperfections of Sensors Make Smartphone Users Trackable. Srihari Nelakuditi

Imperfections of Sensors Make Smartphone Users Trackable. Srihari Nelakuditi Imperfections of Sensors Make Smartphone Users Trackable Srihari Nelakuditi Privacy is hot in the press Privacy is not a new concern Source: 3M privacy filter for laptops promotional campaign Privacy is

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

Mobility meets Web. Al Johri & David Elutilo

Mobility meets Web. Al Johri & David Elutilo Mobility meets Web Al Johri & David Elutilo Origin-Based Access Control in Hybrid Application Frameworks Outline 1. Introduction Hybrid Apps & Frameworks 2. Security Models 3. Bridges 4. Fracking 5. Existing

More information

HUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30

HUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30 HUAWEI MediaPad T1 8.0 FAQ Issue 01 Date 06/30 HUAWEI TECHNOLOGIES CO., LTD. 1 System and update... 1-1 1.1 Why does my HUAWEI MediaPad T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update

More information

37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS

37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS 37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS TABLE OF CONTENTS INTRODUCTION 3 QUESTIONS BEFORE YOU BUY 4 USING CELLCONTROL 9 iphone-specific QUESTIONS 14 ANDROID AND WINDOWS PHONE-SPECIFIC

More information

CSCI 420: Mobile Application Security. Lecture 15. Prof. Adwait Nadkarni

CSCI 420: Mobile Application Security. Lecture 15. Prof. Adwait Nadkarni CSCI 420: Mobile Application Security Lecture 15 Prof. Adwait Nadkarni 1 Running scripts from home apktool instructions: Move both files (apktool.jar & apktool) to /usr/local/bin (root needed) No-root

More information

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced

More information

Mobile Derived Credentials Purebred Information Brief

Mobile Derived Credentials Purebred Information Brief Mobile Derived Credentials Purebred Information Brief Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

Opportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA)

Opportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) Opportunistic CrowdSensing Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) On-going Large-scale Opportunistic CrowdSensing Investigations in MASS Lowering Energy Consumed

More information

Medigate and Palo Alto Networks Integration

Medigate and Palo Alto Networks Integration Medigate and Palo Alto Networks Integration A Superior Security Solution for Connected Medical Devices Medigate and Palo Alto Networks have teamed together to deliver a best-in-class solution that addresses

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

Android. Operating System and Architecture. Android. Screens. Main features

Android. Operating System and Architecture. Android. Screens. Main features Android Android Operating System and Architecture Operating System and development system from Google and Open Handset Alliance since 2008 At the lower level is based on the Linux kernel and in a higher

More information

AtLongLat. Location aggregation and developer platform. Jeff Weinstein. Stephen Pike. Faculty Advisor: Zachary G. Ives

AtLongLat. Location aggregation and developer platform. Jeff Weinstein. Stephen Pike. Faculty Advisor: Zachary G. Ives AtLongLat Location aggregation and developer platform Jeff Weinstein Stephen Pike Faculty Advisor: Zachary G. Ives April 24, 2009 Abstract AtLongLat (http://atlonglat.scpike.net) lets users share their

More information

Defining Security for an AWS EKS deployment

Defining Security for an AWS EKS deployment Defining Security for an AWS EKS deployment Cloud-Native Security www.aporeto.com Defining Security for a Kubernetes Deployment Kubernetes is an open-source orchestrator for automating deployment, scaling,

More information

GPS FOR CAREGIVERS Overview To use GPS visit verification, you must use a device that can access the internet and has GPS-enabled. GPS location services is typically offered on Android and iphone phones,

More information

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

QUICK START GUIDE NTS HOSTED PBX CALL MANAGER. Welcome. Getting Oriented

QUICK START GUIDE NTS HOSTED PBX CALL MANAGER.   Welcome. Getting Oriented QUICK START GUIDE NTS HOSTED PBX Welcome Welcome to NTS Hosted PBX! This guide is intended to get you up and running with the basic features associated with the product. For more in-depth information,

More information

Getting Started on the Tablet

Getting Started on the Tablet Updated 02/28/2017 Table of Contents Getting Started Setting up the Tablet (BYOD)...1 Settings...1 Adding Settings App to Home Screen...1 Bluetooth...2 Data...3 Display...3 Location Services...4 Date &

More information

Vehicle To Android Communication Mode

Vehicle To Android Communication Mode Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Firewall. Firewall For further information on installing the Remote Control app please refer to page 3 of this document.

Firewall. Firewall For further information on installing the Remote Control app please refer to page 3 of this document. Firewall For further information on installing the Remote Control app please refer to page 3 of this document. By enabling this feature you can create one or more blacklists to block calls and messages

More information

Distributed Systems - Mertz & McCarthy

Distributed Systems - Mertz & McCarthy Design Issues in Distributed Mobile Applications Association Sensing and Context Awareness Security and Privacy Adaptation Devices Appear and disappear from the space. Do so unpredictably May be totally

More information

2 Experience Surround Wifi

2 Experience Surround Wifi USER GUIDE 2 Experience Surround Wifi Table of Contents ABOUT LUMA 4 INSTALL LUMA 6 Get started 7 Get the Luma app 8 Create an account 9 Customize for your home 10 Set up Luma system 11 WIFI 14 Your network

More information

Mobile Platform Security Architectures A perspective on their evolution

Mobile Platform Security Architectures A perspective on their evolution Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest

More information

Mi Home Security Camera Connection Guide. (ios)

Mi Home Security Camera Connection Guide. (ios) Mi Home Security Camera Connection Guide (ios) 1. Navigate to the APP Store with your iphone and search for Mi Home, or scan the QR code below to download and install Mi Home APP. 2. Plug in the Mi Home

More information

Sensors. Mobile Application Development in ios School of EECS Washington State University Instructor: Larry Holder

Sensors. Mobile Application Development in ios School of EECS Washington State University Instructor: Larry Holder Sensors Mobile Application Development in ios School of EECS Washington State University Instructor: Larry Holder Mobile Application Development in ios 1 Outline Sensor types Sensor availability Accessing

More information

Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps

Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps Yanyan Zhuang University of Colorado, Colorado Springs Albert Rafetseder New York University Yu Hu New York University ABSTRACT

More information

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar. Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment

More information

Achieving k-anonmity* Privacy Protection Using Generalization and Suppression

Achieving k-anonmity* Privacy Protection Using Generalization and Suppression UT DALLAS Erik Jonsson School of Engineering & Computer Science Achieving k-anonmity* Privacy Protection Using Generalization and Suppression Murat Kantarcioglu Based on Sweeney 2002 paper Releasing Private

More information

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home! Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research

More information

Time Distortion Anonymization for the Publication of Mobility Data with High Utility

Time Distortion Anonymization for the Publication of Mobility Data with High Utility Time Distortion Anonymization for the Publication of Mobility Data with High Utility Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux and Lionel Brunie Mobility data usefulness Real-time traffic,

More information

Mobile Millennium Using Smartphones as Traffic Sensors

Mobile Millennium Using Smartphones as Traffic Sensors Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology

More information

CHARLES DARWIN, CYBERSECURITY VISIONARY

CHARLES DARWIN, CYBERSECURITY VISIONARY SESSION ID: SPO1-W12 CHARLES DARWIN, CYBERSECURITY VISIONARY Dan Schiappa SVP and GM, Products Sophos @dan_schiappa It is not the strongest of the species that survives, nor the most intelligent that survives.

More information

Xin Pan. CSCI Fall

Xin Pan. CSCI Fall Xin Pan CSCI5448 2011 Fall Outline Introduction of Android System Four primary application components AndroidManifest.xml Introduction of Android Sensor Framework Package Interface Classes Examples of

More information

Scippa: System-Centric IPC Provenance on Android

Scippa: System-Centric IPC Provenance on Android Scippa: System-Centric IPC Provenance on Android Michael Backes, Sven Bugiel, Sebastian Gerling Saarland Univeristy, Germany 2014 Annual Computer Security Applications Conference Presenter: Qi Wang 1 Android

More information

Enterprise Security Solutions by Quick Heal. Seqrite.

Enterprise Security Solutions by Quick Heal. Seqrite. Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices

More information

Introduction to Samsung KNOX Tizen

Introduction to Samsung KNOX Tizen Introduction to Samsung KNOX Tizen Name Company Agenda Why B2B matters in China Why should developers care about B2B? The importance of Mobile Device Management KNOX Tizen introduction What is KNOX Tizen

More information

PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time

PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time Chulhong Min 1 Youngki Lee 2 Chungkuk Yoo 1 Seungwoo Kang 3 Sangwon Choi 1 Pillsoon Park

More information

EMBEDDED SYSTEMS 2017 IEEE PROJECT

EMBEDDED SYSTEMS 2017 IEEE PROJECT EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.

More information

device management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)]

device management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)] Knox container device management policy The following policies can be applied to Knox container of Samsung devices. System group Screen capture Clipboard Share list Google account synchronization App crash

More information

Vendor Held Equipment (VHE) Project

Vendor Held Equipment (VHE) Project Issue February 2018 Vendor Held Equipment (VHE) Project New App Depot Container 2.0 for both Android and ios devices Job Aid Page 1 of 6 Contents Overview:... 2 Purpose:... 2 VAST Scanning App:... 3 APP

More information

The IBM MobileFirst Platform

The IBM MobileFirst Platform The IBM MobileFirst Platform Curtis Miles IBM MobileFirst Solution Architect April 14, 2015 What is the IBM MobileFirst Platform? A modular set " of libraries, tools, and runtimes " that help you " easily

More information

CS 4518 Mobile and Ubiquitous Computing Lecture 10: Location-Aware Computing Emmanuel Agu

CS 4518 Mobile and Ubiquitous Computing Lecture 10: Location-Aware Computing Emmanuel Agu CS 4518 Mobile and Ubiquitous Computing Lecture 10: Location-Aware Computing Emmanuel Agu Reminder: Final Project 1-slide from group next Monday (2/6): 2/40 of final project grade Slide should contain

More information

20/20 Insight and WebResponse Whitelist & Settings Information

20/20 Insight and WebResponse Whitelist & Settings Information Overview: 20/20 Insight is comprised of a Desktop component and a web-based component: WebResponse. Surveys are created in the desktop component and then uploaded to the web-based component. The web-based

More information

The C-Suite Guide to Mobile Technologies for mhealth Development. Medical Web ExpertsTM

The C-Suite Guide to Mobile Technologies for mhealth Development. Medical Web ExpertsTM The C-Suite Guide to Mobile Technologies for mhealth Development Medical Web ExpertsTM January 2017 Executive Summary mhealth technologies are forming a more integral part of many healthcare organizations

More information

Murphy resource policy engine

Murphy resource policy engine Murphy resource policy engine Janos Kovacs Intel / Open Source Technology Center October, 2013 2 Introduction What is Murphy? Policy Management framework Open source project http://01.org/murphy Started

More information

Mobile Computing LECTURE # 1

Mobile Computing LECTURE # 1 Mobile Computing LECTURE # 1 The Course Course Code: IT-4545 Course Title: Mobile Computing Instructor: JAWAD AHMAD Email Address: jawadahmad@uoslahore.edu.pk Web Address: http://csandituoslahore.weebly.com/mc.html

More information

COMPUTING SUBJECT KNOWLEDGE AUDIT

COMPUTING SUBJECT KNOWLEDGE AUDIT COMPUTING SUBJECT KNOWLEDGE AUDIT Use this needs analysis to help self-assess and track your computing subject knowledge. Topic Area 1 Computational thinking Define, explain and use these concepts with

More information

SENSOR SYSTEMS AND THE ART

SENSOR SYSTEMS AND THE ART SENSOR SYSTEMS AND THE ART OF EFFECTIVELY DEPLOYING SENSOR NETWORKS PAT PANNUTO UNIVERSITY OF MICHIGAN TECHCHANGE TC111 CellPump: Using sensors to improve efficacy 30-80% of water pumps fail within 1 year

More information

ATC Android Application Development

ATC Android Application Development ATC Android Application Development 1. Android Framework and Android Studio b. Android Platform Architecture i. Linux Kernel ii. Hardware Abstraction Layer(HAL) iii. Android runtime iv. Native C/C++ Libraries

More information

Self-driving Datacenter: Analytics

Self-driving Datacenter: Analytics Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

GeoLocation Overview

GeoLocation Overview GeoLocation Overview Location-as-a-Service How Mobile, igaming and Lottery Markets can Advance with Layered Location Intelligence LocationSmart 2035 Corte del Nogal, Suite 110 Carlsbad, CA 92011 White

More information

XHound: Quantifying the Fingerprintability of Browser Extensions. Priyankit Bangia Software Engineering. By Oleksii Starov & Nick Nikiforakis

XHound: Quantifying the Fingerprintability of Browser Extensions. Priyankit Bangia Software Engineering. By Oleksii Starov & Nick Nikiforakis XHound: Quantifying the Fingerprintability of Browser Extensions By Oleksii Starov & Nick Nikiforakis Priyankit Bangia Software Engineering INTRODUCTION What are browser extensions? Browsers are designed

More information

Syllabus- Java + Android. Java Fundamentals

Syllabus- Java + Android. Java Fundamentals Introducing the Java Technology Syllabus- Java + Android Java Fundamentals Key features of the technology and the advantages of using Java Using an Integrated Development Environment (IDE) Introducing

More information

MarkLogic 8 Overview of Key Features COPYRIGHT 2014 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED.

MarkLogic 8 Overview of Key Features COPYRIGHT 2014 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. MarkLogic 8 Overview of Key Features Enterprise NoSQL Database Platform Flexible Data Model Store and manage JSON, XML, RDF, and Geospatial data with a documentcentric, schemaagnostic database Search and

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Feature Extraction in Wireless Personal and Local Area Networks

Feature Extraction in Wireless Personal and Local Area Networks Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content

More information

Languages for SDN (Frenetic)

Languages for SDN (Frenetic) Languages for SDN (Frenetic) Software Defined Networking: The Data Centre Perspective Seminar Informatikdienste A. Pantelopoulos 20.05.2016 1 SDN is useful Direct network control. Enables new applications,

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

Android 5.1 operating system update for your

Android 5.1 operating system update for your Android 5.1 operating system update for your Software Version: 23.11.39.quark_verizon.verizon.en.USvzw Verizon Wireless is excited to announce a new software update for the Droid Turbo by Motorola. This

More information