Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS

Size: px
Start display at page:

Download "Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS"

Transcription

1 Android Forensics Investigation, Analysis, and Mobile Security for Google Android Andrew Hoog John McCash, Technical Editor AMSTERDAM BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO. SINGAPORE SYDNEY TOKYO SYNGRESS Syngress is an imprint of Elsevier

2 Contents Acknowledgements Introduction About the Author xiii xv xix CHAPTER 1 Android and Mobile Forensics i Introduction 1 Android Platform 1 History of Android 3 Google's Strategy 7 Linux, Open Source Software, and Forensics 10 Brief History of Linux 11 Android Open Source Project 25 AOSP Licenses 26 Development Process 27 Value of Open Source in Forensics 27 Downloading and Compiling AOSP 29 Internationalization 31 Unicode 31 Keyboards 31 Custom Branches 32 Android Market 33 Installing an App 34 Application Statistics 37 Android Forensics 37 Challenges 38 Summary 38 References 39 CHAPTER 2 Android Hardware Platforms...41 Introduction 41 Overview of Core Components 41 Central Processing Unit 41 Baseband Modem/Radio 42 Memory (Random-Access Memory and NAND Flash) 42 Global Positioning System 43 Wireless (Wi-Fi.com and Bluetooth) 43 Secure Digital Card 44 Screen 44 Camera 44 Keyboard 45

3 viii Contents Battery 45 Universal Serial Bus 46 Accelerometer/Gyroscope 46 Speaker/Microphone 46 Overview of Different Device Types 47 Smartphone 47 Tablet 47 Netbook 48 Google TV 48 Vehicles (In-board) 48 Global Positioning System 49 Other Devices 49 ROM and Boot Loaders 49 Power On and On-chip Boot ROM Code Execution 50 Boot Loader (Initial Program Load/Second Program Loader) 50 Linux Kernel 51 The Init Process 51 Zygote and Dalvik 54 System Server 54 Manufacturers 56 Android Updates 57 Custom User Interfaces 58 Aftermarket Android Devices 58 Specific Devices 59 T-MobileGl 59 Motorola Droid 59 HTC Incredible 60 Google Nexus One 60 Summary 62 References 62 CHAPTER 3 Android Software Development Kit and Android Debug Bridge 65 Introduction 65 Android Platforms 65 Android Platform Highlights Through (Gingerbread) 67 Software Development Kit (SDK) 71 SDK Release History 71 SDK Install 72 Android Virtual Devices (Emulator) 81 Android OS Architecture 86 Dalvik VM 87

4 Contents ix Native Code Development 88 Android Security Model 88 Forensics and the SDK 90 Connecting an Android Device to a Workstation 90 USB Interfaces 94 Introduction to Android Debug Bridge 100 Summary References 103 CHAPTER 4 Android File Systems and Data Structures 105 Introduction 105 Data in the Shell 105 What Data are Stored 106 App Data Storage Directory Structure 106 How Data are Stored 107 Type of Memory RAM File Systems 132 rootfs, devpts, sysfs, and cgroup File Systems 133 proc tmpfs Extended File System (EXT) 140 FAT32/VFAT 140 YAFFS2 141 Mounted File Systems Mounted File Systems 154 Summary References 157 CHAPTER 5 Android Device, Data, and App Security 159 Introduction 159 Data Theft Targets and Attack Vectors 160 Android Devices as a Target 160 Android Devices as an Attack Vector 168 Data Storage 168 Recording Devices 169 Security Considerations 170 Security Philosophy 170 US Federal Computer Crime Laws and Regulations 172 Open Source Versus Closed Source 173 Encrypted NAND Flash 175 Individual Security Strategies 176 Corporate Security Strategies 178 Policies 178

5 X Contents Password/Pattern/PIN Lock 178 Remote Wipe of Device 179 Upgrade to Latest Software 180 Remote Device Management Features 181 Application and Device Audit 183 App Development Security Strategies 184 Mobile App Security Testing 184 App Security Strategies 186 Summary 192 References 193 CHAPTER 6 Android Forensic Techniques 195 Introduction 195 Types of Investigations 195 Difference Between Logical and Physical Techniques 196 Modification of the Target Device 197 Procedures for Handling an Android Device 198 Securing the Device 199 Network Isolation 200 How to Circumvent the Pass Code 203 Imaging Android USB Mass Storage Devices 211 SD Card Versus emmc 211 How to Forensically Image the SD Card/eMMC 212 Logical Techniques 218 ADB Pull 218 Backup Analysis 219 AFLogical 220 Commercial Providers 228 Physical Techniques 266 Hardware-Based Physical Techniques 268 JTAG 268 Chip-off 270 Software-Based Physical Techniques and Privileges 270 AFPhysical Technique 278 Summary 284 References 284 CHAPTER 7 Android Application and Forensic Analysis 285 Introduction 285 Analysis Techniques 285 Timeline Analysis 285 File System Analysis 288 File Carving 291 Strings 293

6 Contents xi Hex: A Forensic Analyst's Good Friend 296 Android Directory Structures 301 FAT Forensic Analysis 308 FAT Timeline Analysis 309 FAT Additional Analysis 316 FAT Analysts Notes 317 YAFFS2 Forensic Analysis 321 YAFFS2 Timeline Analysis 324 YAFFS2 File System Analysis 330 YAFFS2 File Carving 332 YAFFS2 Strings Analysis 334 YAFFS2 Analyst Notes 335 Android App Analysis and Reference 340 Messaging (sms and mms) 340 MMS Helper Application 341 Browser 342 Contacts 347 Media Scanner 349 YouTube 350 Cooliris Media Gallery 353 Google Maps 354 Gmail 358 Facebook 360 Adobe Reader 363 Summary 363 References 364 Index 365

Android Forensics Concept

Android Forensics Concept Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few

More information

Embedded Systems Architecture

Embedded Systems Architecture Embedded Systems Architecture A Comprehensive Guide for Engineers and Programmers By Tammy Noergaard ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

Coding for Penetration

Coding for Penetration Coding for Penetration Testers Building Better Tools Jason Andress Ryan Linn ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is

More information

Coding for Penetration Testers Building Better Tools

Coding for Penetration Testers Building Better Tools Coding for Penetration Testers Building Better Tools Second Edition Jason Andress Ryan Linn Clara Hartwell, Technical Editor ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO

More information

Managed. Code Rootkits. Hooking. into Runtime. Environments. Erez Metula ELSEVIER. Syngress is an imprint of Elsevier SYNGRESS

Managed. Code Rootkits. Hooking. into Runtime. Environments. Erez Metula ELSEVIER. Syngress is an imprint of Elsevier SYNGRESS Managed Code Rootkits Hooking into Runtime Environments Erez Metula ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint

More information

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics

More information

Android Forensics: Simplifying Cell Phone Examinations

Android Forensics: Simplifying Cell Phone Examinations Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite

More information

and Security Testing Shawn Valle gmail. com May 2013

and Security Testing Shawn Valle gmail. com May 2013 and Security Testing Shawn Valle shawnvalle @ gmail. com May 2013 Introductions 16 years in IT and security (CISSP, MCP, LCP) Co-established FFRDC s Mobile Security Practice in 2010, leading engineering

More information

Android Forensics Techniques. Zlatko Jovanovic. Instructor Dr DeAndre Redd. International Academy of Design and Technology

Android Forensics Techniques. Zlatko Jovanovic. Instructor Dr DeAndre Redd. International Academy of Design and Technology Android Forensics Techniques Zlatko Jovanovic Instructor Dr DeAndre Redd International Academy of Design and Technology January 28, 2012 Abstract Paper discusses different specific forensic techniques

More information

IJRDTM Kailash ISBN No Vol.17 Issue

IJRDTM Kailash ISBN No Vol.17 Issue ABSTRACT ANDROID OPERATING SYSTEM : A CASE STUDY by Pankaj Research Associate, GGSIP University Android is a software stack for mobile devices that includes an operating system, middleware and key applications.

More information

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform

More information

MSP430 Microcontroller Basics

MSP430 Microcontroller Basics MSP430 Microcontroller Basics John H. Davies AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Newnes is an imprint of Elsevier N WPIGS Contents Preface

More information

Computers as Components Principles of Embedded Computing System Design

Computers as Components Principles of Embedded Computing System Design Computers as Components Principles of Embedded Computing System Design Third Edition Marilyn Wolf ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Programming 8-bit PIC Microcontrollers in С

Programming 8-bit PIC Microcontrollers in С Programming 8-bit PIC Microcontrollers in С with Interactive Hardware Simulation Martin P. Bates älllllltlilisft &Щ*лЛ AMSTERDAM BOSTON HEIDELBERG LONDON ^^Ш NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

Android AOSP Overview. Karthik Dantu and Steve Ko

Android AOSP Overview. Karthik Dantu and Steve Ko Android AOSP Overview Karthik Dantu and Steve Ko Administrivia Any issues in building? Android Build System & Source Tree Today s goal Getting to know the build system Navigating the source tree Resources

More information

A Study of User Data Integrity During Acquisition of Android Devices

A Study of User Data Integrity During Acquisition of Android Devices DIGITAL FORENSIC RESEARCH CONFERENCE By Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee Presented At The Digital Forensic Research Conference DFRWS 2013 USA Monterey, CA

More information

The Definitive Guide to the ARM Cortex-M3

The Definitive Guide to the ARM Cortex-M3 The Definitive Guide to the ARM Cortex-M3 Joseph Yiu AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Newnes is an imprint of Elsevier Newnes Forewopd

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: Friendly ARM MINI2440 & Dalvik Virtual Machine with Android Sangamesh Gama 1 and Manjula C 2 1 Assistant Professor, Department of Computer Science and Engineering, BKIT Bhalki, India 2 Associate Software

More information

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc.

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android forensics Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android and mobile forensics Any interaction with the smartphone will change the device in some way Use judgment,

More information

Understand and Implement Effective PCI Data Security Standard Compliance

Understand and Implement Effective PCI Data Security Standard Compliance PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance Second Edition Dr. Anton A. Chuvakin Branden R. Williams Technical Editor Ward Spangenberg ELSEVIER AMSTERDAM BOSTON

More information

Open-Source Robotics and Process Control Cookbook

Open-Source Robotics and Process Control Cookbook Open-Source Robotics and Process Control Cookbook This page intentionally left blank Open-Source Robotics and Process Control Cookbook Designing and Building Robust, Dependable Real-Time Systems by Lewin

More information

Maya Python. for Games and Film. and the Maya Python API. A Complete Reference for Maya Python. Ryan Trowbridge. Adam Mechtley ELSEVIER

Maya Python. for Games and Film. and the Maya Python API. A Complete Reference for Maya Python. Ryan Trowbridge. Adam Mechtley ELSEVIER Maya Python for Games and Film A Complete Reference for Maya Python and the Maya Python API Adam Mechtley Ryan Trowbridge AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

ITG Software Engineering

ITG Software Engineering Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building

More information

An Introduction to Parallel Programming

An Introduction to Parallel Programming F 'C 3 R'"'C,_,. HO!.-IJJ () An Introduction to Parallel Programming Peter S. Pacheco University of San Francisco ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

Cellebrite Digital Forensics for Legal Professionals (CDFL)

Cellebrite Digital Forensics for Legal Professionals (CDFL) Global forensic training Course description Level Intermediate Length Two days (14 hours) Training Track Investigative The two-day Cellebrite Digital Forensics for Legal Professionals course is designed

More information

Release Notes Zebra TC51 and TC56 Android M MG (GMS)

Release Notes Zebra TC51 and TC56 Android M MG (GMS) Release Notes Zebra TC51 and TC56 01-21- 04.1MG (GMS) Introduction Description Known Issues and Limitation Contents Device Compatibility Installation Requirements Installation Instructions Change Notes

More information

Android Overview. Francesco Mercaldo, PhD

Android Overview. Francesco Mercaldo, PhD Android Overview Francesco Mercaldo, PhD Post-Doctoral researcher Corso di Sicurezza delle Reti e dei Sistemi Software Università degli Studi del Sannio (fmercaldo@unisannio.it) Things are not always what

More information

Moving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER.

Moving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER. Moving to the Cloud Developing Apps in the New World of Cloud Computing Dinkar Sitaram Geetha Manjunath Technical Editor David R. Deily AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO

More information

Android Gingerbread Manually Update To Jelly Bean Features

Android Gingerbread Manually Update To Jelly Bean Features Android Gingerbread Manually Update To Jelly Bean 4.1.2 Features How to upgrade android 4.0, 4.1, 4.1.1, 4.1.2, 4.2.2 to 4.3 jellybean, 4.4, 4.4.1, 4.4.3, 4.4.4. Install latest Official Android 2.3.6 Gingerbread

More information

Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems Peter Barry Patrick Crowley ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

Why Android? Why Android? Android Overview. Why Mobile App Development? 20-Nov-18

Why Android? Why Android? Android Overview. Why Mobile App Development? 20-Nov-18 Why Android? Android Overview Dr. Siddharth Kaza Dr. Josh Dehlinger A lot of students have them 2010 survey by University of CO 1 : 22% of college students have Android phone (26% Blackberry, 40% iphone)

More information

FISMAand the Risk Management Framework

FISMAand the Risk Management Framework FISMAand the Risk Management Framework The New Practice of Federal Cyber Security Stephen D. Gantz Daniel R. Phi I pott Darren Windham, Technical Editor ^jm* ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON

More information

Revisiting Storage for Smartphones. Nitin Agrawal

Revisiting Storage for Smartphones. Nitin Agrawal Revisiting Storage for Smartphones Hyojun Kim Nitin Agrawal Cristian Ungureanu Life in the Post-PC Mobile Era Smartphone and tablet markets are huge & growing 100 Million smartphones shipped in Q4 2010,

More information

Tethering an Android Smartphone to USB Devices

Tethering an Android Smartphone to USB Devices Tethering an Android Smartphone to USB Devices March 2011 BizDev@SecureCommConsulting.com Veteran Owned Small Business DUNS: 003083420 CAGE: 4SX48 http://www.securecommconsulting.com 1.1. Purpose This

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Proactive Forensic Support to Android Device

Proactive Forensic Support to Android Device A Framework June 18, 2016 mrkarthik07@gmail.com Department of Cyber Security Amrita Vishwa Vidyapeetham Coimbatore Smartphone OS Market Share, 2015 Q2 1 Figure: Smartphone OS Market Share, 2015 Q2 Android,

More information

Security for Microsoft Windows System Administrators

Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Introduction to Key Information Security Concepts Derrick Rountree Rodney Buike, Technical Editor

More information

CompTIA A+s. Guide to 802: Managing. and Troubleshooting PCs. Mike Meyers' (Exam ) Fourth Edition. Mike Meyers.

CompTIA A+s. Guide to 802: Managing. and Troubleshooting PCs. Mike Meyers' (Exam ) Fourth Edition. Mike Meyers. Mike Meyers' CompTIA A+s Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam 220-802) Mike Meyers New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan

More information

Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7

Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7 Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7 We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online

More information

Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7

Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7 Windows Forensic Analysis Toolkit Third Edition Advanced Analysis Techniques For Windows 7 We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online

More information

HTML5 MOBILE WEBSITES

HTML5 MOBILE WEBSITES HTML5 MOBILE WEBSITES HTML5 MOBILE WEBSITES TURBOCHARGING HTML5 WITH jquery MOBILE, SENCHA TOUCH, AND OTHER FRAMEWORKS MATTHEW DAVID AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Mobile Internet Devices and the Cloud

Mobile Internet Devices and the Cloud Mobile Internet Devices and the Cloud What Is a Smartphone? Mobile Operating Systems for Smartphones 1. iphone 2. Google (Android) 3. Blackberry 4. Windows Mobile 5. Ubuntu Mobile Internet Device (MID)

More information

Mobile Forensics: Android Platforms and WhatsApp Extraction Tools

Mobile Forensics: Android Platforms and WhatsApp Extraction Tools Mobile Forensics: Android Platforms and Extraction Tools Saleh AlHidaifi University of Bedfordshire Luton, England, UK ABSTRACT Today, mobile phones are ones of the technologies that most troublesome and

More information

Android OS. Operating System based on Linux [ ] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus]

Android OS. Operating System based on Linux [ ] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus] 1 Android OS Operating System based on Linux [24-02-16] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus] 1 https://www.androidpit.com/android-marshmallow-update-overview-for-smartphones-and-tablets 2 https://blog.idrsolutions.com/2014/12/android-apps-ide-for-java-coder-programmers/

More information

Android. Lesson 1. Introduction. Android Developer Fundamentals. Android Developer Fundamentals. to Android 1

Android. Lesson 1. Introduction. Android Developer Fundamentals. Android Developer Fundamentals. to Android 1 Android Lesson 1 1 1 1.0 to Android 2 Contents Android is an ecosystem Android platform architecture Android Versions Challenges of Android app development App fundamentals 3 Android Ecosystem 4 What is

More information

Survey on Android Forensic Tools and Methodologies

Survey on Android Forensic Tools and Methodologies Survey on Android Forensic Tools and Methodologies Venkateswara Rao V. CSE, UCEK, JNTUK Kakinada, India A. S. N. Chakravarthy CSE, UCEK, JNTUK Kakinada, India ABSTRACT In recent days, Android Operating

More information

FPGAs: Instant Access

FPGAs: Instant Access FPGAs: Instant Access Clive"Max"Maxfield AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO % ELSEVIER Newnes is an imprint of Elsevier Newnes Contents

More information

Android System Development Training 4-day session

Android System Development Training 4-day session Android System Development Training 4-day session Title Android System Development Training Overview Understanding the Android Internals Understanding the Android Build System Customizing Android for a

More information

Release Notes Zebra VC80x Android N Update 003 based on NG-00-A (GMS)

Release Notes Zebra VC80x Android N Update 003 based on NG-00-A (GMS) Release Notes Zebra VC80x Android N Update 003 based on 01-01-48-NG-00-A (GMS) Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Special

More information

Android - open source mobile platform

Android - open source mobile platform Android - open source mobile platform Alexander Schreiber http://www.thangorodrim.de/ Chemnitzer Linux-Tage 2009 Alexander Schreiber Android - open source mobile

More information

Securing Android-Powered Mobile Devices Using SELinux

Securing Android-Powered Mobile Devices Using SELinux Securing Android-Powered Mobile Devices Using SELinux This paper appears in: Security & Privacy, IEEE Issue Date: May- June 2010 Volume: 8 Issue:3 On page(s): 36-44 Asaf Shabtai, Yuval Fledel, and Yuval

More information

Algorithmic Graph Theory and Perfect Graphs

Algorithmic Graph Theory and Perfect Graphs Algorithmic Graph Theory and Perfect Graphs Second Edition Martin Charles Golumbic Caesarea Rothschild Institute University of Haifa Haifa, Israel 2004 ELSEVIER.. Amsterdam - Boston - Heidelberg - London

More information

Android Forensics. Android Forensics Mobile Forensics World 2009

Android Forensics. Android Forensics Mobile Forensics World 2009 Android Forensics 1 Android Forensics Mobile Forensics World 2009 Presented by Andrew Hoog May 29, 2009 Android mobile platform 2 July 2005: Google acquires Android, Inc. Andy Rubin now Sr. Director of

More information

Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, Karnataka

Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, Karnataka FUTURE DIRECTIONS FOR FIRMWARE FLASHING ON ANDROID DEVICES Yadunandan Laxman Huded* & S. Srinath** Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore,

More information

M (~ Computer Organization and Design ELSEVIER. David A. Patterson. John L. Hennessy. University of California, Berkeley. Stanford University

M (~ Computer Organization and Design ELSEVIER. David A. Patterson. John L. Hennessy. University of California, Berkeley. Stanford University T H I R D EDITION REVISED Computer Organization and Design THE HARDWARE/SOFTWARE INTERFACE David A. Patterson University of California, Berkeley John L. Hennessy Stanford University With contributions

More information

Manual Flash Install Android Adobe Tablet >>>CLICK HERE<<<

Manual Flash Install Android Adobe Tablet >>>CLICK HERE<<< Manual Flash Install Android Adobe 2.2 10.1 Tablet 1 - Install Adobe Flash Player on Android 2.2 Tablets for Online Video 2. 9 - Install the Adobe Flash Player Manually on Any Android Device Updated! 32

More information

BECOMING MORE EFFECTIVE WITH THE ANDROID EMULATOR

BECOMING MORE EFFECTIVE WITH THE ANDROID EMULATOR AnDevCon San Francisco 2013 PRESENTED BY LUIS DE LA ROSA DIRECTOR OF TECHNOLOGY @louielouie BECOMING MORE EFFECTIVE WITH THE ANDROID EMULATOR AKA ANDROID EMULATOR MYTHS... BUSTED! 2.1 WHAT YOU WILL LEARN

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Minsoo Ryu Hanyang University Outline 1. Definition of embedded systems 2. History and applications 3. Characteristics of embedded systems Purposes and constraints User

More information

Manually Adobe Flash Player For Android Phone 4.0 4

Manually Adobe Flash Player For Android Phone 4.0 4 Manually Adobe Flash Player For Android Phone 4.0 4 hi, why there is no flash player for newer/est versions of android. apparently to Flash Player in the GooglePlay store for all Android devices running

More information

Mobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX

Mobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX Mobile Hacking & Security Ir. Arthur Donkers & Ralph Moonen, ITSX Introduction Who we are: Ir. Arthur Donkers Ralph Moonen ITSX 2 Agenda Mobile Threats BYOD iphone and Android hacking 3 Threats Various:

More information

Computer Architecture A Quantitative Approach

Computer Architecture A Quantitative Approach Computer Architecture A Quantitative Approach Third Edition John L. Hennessy Stanford University David A. Patterson University of California at Berkeley With Contributions by David Goldberg Xerox Palo

More information

D1S - Embedded Linux with Ac6 System Workbench

D1S - Embedded Linux with Ac6 System Workbench Formation Embedded Linux with Ac6 System Workbench: Implementing Linux on Embedded Systems - Systèmes d'exploitation: Linux D1S - Embedded Linux with Ac6 System Workbench Implementing Linux on Embedded

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

REQUIRED TEXT: Mobile Phone Examiner Training Manual. Various articles and white papers. as assigned by instructor

REQUIRED TEXT: Mobile Phone Examiner Training Manual. Various articles and white papers. as assigned by instructor Course: CJ 4750 Small Devices Forensics Credit Hours: 3 credit hours Instructor: Joan Runs Through Office Phone: (435) 879-4420 Office Hours: TBA PREREQUISITES: CJ 2700 (CJ 3900 is highly recommended)

More information

Logging and Log Management

Logging and Log Management Logging and Log Management The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management Dr. Anton A. Chuvakin Kevin J. Schmidt Christopher Phillips Partricia Moulder, Technical

More information

Introduction. Assessment Test. Part I

Introduction. Assessment Test. Part I Contents Introduction Assessment Test xxix lvii Part I 220 901 1 Chapter 1 Motherboards, Processors, and Memory 3 Identifying Components of Motherboards 5 System Board Form Factors 6 System Board Components

More information

Understanding Storage I/O Behaviors of Mobile Applications. Louisiana State University Department of Computer Science and Engineering

Understanding Storage I/O Behaviors of Mobile Applications. Louisiana State University Department of Computer Science and Engineering Understanding Storage I/O Behaviors of Mobile Applications Jace Courville jcourv@csc.lsu.edu Feng Chen fchen@csc.lsu.edu Louisiana State University Department of Computer Science and Engineering The Rise

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information

Release Notes Zebra MC92 Android KK LifeGuard Update 02 Release

Release Notes Zebra MC92 Android KK LifeGuard Update 02 Release Release Notes Zebra MC92 Android KK LifeGuard Update 02 Release Contents Component Contents Device Compatibility Installation Requirements Installation Instructions Downloadable Software included in this

More information

Galaxy Note Root Guide. by Max Lee

Galaxy Note Root Guide. by Max Lee Galaxy Note Root Guide by Max Lee Copyright 2012 by RootGalaxyNote.com Table of Contents How to Root Galaxy Note! [GT-N7000] Why root your Galaxy Note? How to Root Your Galaxy Note! (This is for GT-N7000

More information

Engineering Real- Time Applications with Wild Magic

Engineering Real- Time Applications with Wild Magic 3D GAME ENGINE ARCHITECTURE Engineering Real- Time Applications with Wild Magic DAVID H. EBERLY Geometric Tools, Inc. AMSTERDAM BOSTON HEIDELRERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

Release Notes Zebra VC80x AndroidN Update005 based on NG-00-A Release for GMS

Release Notes Zebra VC80x AndroidN Update005 based on NG-00-A Release for GMS Release Notes Zebra VC80x AndroidN Update005 based on 01-01-49-NG-00-A Release for GMS Introduction Description Zebra Value Adds Feature List Device Compatibility Component Contents Installation Requirements

More information

Introduction to Android

Introduction to Android Introduction to Android http://myphonedeals.co.uk/blog/33-the-smartphone-os-complete-comparison-chart www.techradar.com/news/phone-and-communications/mobile-phones/ios7-vs-android-jelly-bean-vs-windows-phone-8-vs-bb10-1159893

More information

Manual Update To Android 4.4 Kitkat Cyanogenmod 11 Rom For Galaxy S I9000

Manual Update To Android 4.4 Kitkat Cyanogenmod 11 Rom For Galaxy S I9000 Manual Update To Android 4.4 Kitkat Cyanogenmod 11 Rom For Galaxy S I9000 As you know, then CyanogenMod doesn't need the GApps package to work Pingback: Update Samsung Galaxy S I9000 to Official CM9 Nightly

More information

Android: Under the Hood. GDG-SG DevFest 5th Nov 2016 Jason Zaman

Android: Under the Hood. GDG-SG DevFest 5th Nov 2016 Jason Zaman Android: Under the Hood GDG-SG DevFest 5th Nov 2016 Jason Zaman Overview Who am I? Android Block Diagram Mobile Hardware Filesystem Layout Startup Linux Kernel Bionic libc Ashmem / Binder IPC Zygote Dalvik

More information

Android Gingerbread Manually Update To Jelly Bean Features

Android Gingerbread Manually Update To Jelly Bean Features Android Gingerbread Manually Update To Jelly Bean 4.1 2 Features How to upgrade android 4.0, 4.1, 4.1.1, 4.1.2, 4.2.2 to 4.3 jellybean, 4.4, 4.4.1, 4.4.3, 4.4. Compare versions: Android M vs Android 5.1

More information

Traditional vs. Mobile Operating Systems

Traditional vs. Mobile Operating Systems Traditional vs. Mobile Operating Systems CS-502 Fall 2011 James Process Andrew Sawchuk Jeffrey Martin Mike Sandman Overview Introduction Design Development Test Packaging/Distribution Wrap-up Introduction

More information

Release Notes Zebra VC80x Android N LifeGuard Update 08 for GMS

Release Notes Zebra VC80x Android N LifeGuard Update 08 for GMS Release Notes Zebra VC80x Android N LifeGuard Update 08 for GMS Introduction Description Device Compatibility Component Contents Installation Requirements Installation Instructions Downloadable Software

More information

Application Programming

Application Programming Multicore Application Programming For Windows, Linux, and Oracle Solaris Darryl Gove AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris

More information

CS260 Intro to Java & Android 04.Android Intro

CS260 Intro to Java & Android 04.Android Intro CS260 Intro to Java & Android 04.Android Intro Winter 2015 Winter 2015 CS260 - Intro to Java & Android 1 Android - Getting Started Android SDK contains: API Libraries Developer Tools Documentation Sample

More information

PTC Mathcad Prime 3.0

PTC Mathcad Prime 3.0 Essential PTC Mathcad Prime 3.0 A Guide for New and Current Users Brent Maxfield, P.E. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO @ Academic

More information

User Guide. Android x86 Modified System. Sponsor: Huan Ren. Compiled by: Zachary Bair, Taronish Daruwalla, Joshua Duong, and Anthony Nguyen

User Guide. Android x86 Modified System. Sponsor: Huan Ren. Compiled by: Zachary Bair, Taronish Daruwalla, Joshua Duong, and Anthony Nguyen User Guide Android x86 Modified System Sponsor: Huan Ren Compiled by: Zachary Bair, Taronish Daruwalla, Joshua Duong, and Anthony Nguyen Table of Contents 1. What is Android x86? 2. How to get Android

More information

Presentation Outline 10/16/2016

Presentation Outline 10/16/2016 CPET 491 (Phase II) Fall Semester-2012 Adam O Haver Project Advisor/Instructor: Professor Paul Lin CEIT Department 1 Presentation Outline Executive Summary Introduction Solution Development Software Analysis

More information

Android Gingerbread Manually Update To Jelly Bean

Android Gingerbread Manually Update To Jelly Bean Android Gingerbread Manually Update To Jelly Bean 4.1 2 10.1 You can also download and install/update Google Apps from Google Play Store. These apps Gapps CyanogenMod 10.1 (Android 4.2.1 4.2.2 Jelly Bean)

More information

Android Jelly Bean Manual Install Application On Sd Card

Android Jelly Bean Manual Install Application On Sd Card Android Jelly Bean Manual Install Application On Sd Card All of them except the sd card,have really low space and I can't install 2 but i can move apps to sdcard and my other fone which 4.1.2 doesnt have

More information

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third

More information

AT&T Developer Program

AT&T Developer Program AT&T Developer Program Application Resource Optimizer (ARO) User Guide Publication Date: April 27, 2015 Legal Disclaimer This document and the information contained herein (collectively, the "Information")

More information

Install ADB on Windows

Install ADB on Windows Android Debug Bridge or better known as ADB is a powerful and versatile tool that lets you do a lot of things like pulling out logs, installing and uninstalling apps, transferring files, rooting and flashing

More information

A Design and Implementation of Universal Container

A Design and Implementation of Universal Container , pp.137-143 http://dx.doi.org/10.14257/astl.2016.136.33 A Design and Implementation of Universal Container Xin Li 1, Hee-Kyung Moon 1, Sung-Kook Han 1, 1 Department of Computer Engineering, Wonkwang University

More information

ATV520 User Manual V1.1

ATV520 User Manual V1.1 ATV520 User Manual V1.1 ATV520 Enjoy TV Box User Manual V1.0 Introduction The ATV520, also called Dual core Android TV box, is a box connected to your TV HDMI input that turn your TV to a multifunction

More information

Android In Industrial Applications. A Field Report

Android In Industrial Applications. A Field Report Garz & Fricke Android In Industrial Applications A Field Report Android In Industrial Applications A Field Report Contents What we will talk about Garz & Fricke Company Overview Introduction to Android

More information

System Assurance. Beyond Detecting. Vulnerabilities. Djenana Campara. Nikolai Mansourov

System Assurance. Beyond Detecting. Vulnerabilities. Djenana Campara. Nikolai Mansourov System Assurance Beyond Detecting Vulnerabilities Nikolai Mansourov Djenana Campara ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SYDNEY TOKYO Morgan Kaufmann

More information

Embedded Linux Primer, Second Edition

Embedded Linux Primer, Second Edition Toronto Montreal Boston Paris Embedded Linux Primer, Second Edition A Practical, Real-World Approach Christopher Hallinan PRENTICE HALL Prentice Hall Professional Technical Reference Upper Saddle River,

More information

Research on Improving performance and Battery Backup of Android Mobile with help of Cyanogen Mod, and latest kernel

Research on Improving performance and Battery Backup of Android Mobile with help of Cyanogen Mod, and latest kernel Research on Improving performance and Battery Backup of Android Mobile with help of Cyanogen Mod, and latest kernel Abstract Tushar G Patil. MCA, Mumbai University Institute of Management & Computer Studies,

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 :

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 : Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Smartphone Forensic Analysis: A Case Study

More information

Studio 5.5. User Manual

Studio 5.5. User Manual Studio 5.5 User Manual 1 Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth...

More information

Virtualization from the Trenches

Virtualization from the Trenches ps i: (; v s s o r t w v h \i mioour: TECH KIS CHE INFORM AT 8LIOTHEK UNIVERSITATSBiCLIOTHEK HANNOVER

More information