Automated Assessment of Security Risks for Mobile Applications

Size: px
Start display at page:

Download "Automated Assessment of Security Risks for Mobile Applications"

Transcription

1 Automated Assessment of Security Risks for Mobile Applications Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie Department of Computer Science North Carolina State University

2

3 Lookout Mobile Security has reported that android malware resulted in a loss of US $1 million in Source:

4 F-Secure MOBILE THREAT REPORT Q Source :

5 Approach to Mobile Apps Distribution Open system Developer releases the App on Play Store Users can directly install the Apps Google Inc. SECURITY User has to explicitly grant permissions requested by the App

6 Problem Felt, Adrienne Porter, et al. "Android permissions: User attention, comprehension, and behavior." Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, Only 17% users (participating in the study) paid attention to permissions.

7 Motivations of Recent Android Malware "Yet another modification of the Google Android Snake game. This one listens to the taps for its turn directions." Source:

8 Solution

9 Simple Solution: Keyword-based search Keyword-based search on application descriptions Photo Credit: Ahora estoy en via Flickr

10 Problems with Keyword-based Search Confounding effects: Certain keywords such as contact have a confounding meaning... displays user contact,... contact me at abc@xyz.com Semantic Inference: Sentences often describe a sensitive operation such as reading contacts without actually referring to keyword contact. share yoga exercises with your friends via , sms.

11 WHYPER Implementation APP Description WHYPER APP Permission NLP Parser Semantic Engine Annotated Description API Docs

12 Example Security Metrics-Driven Evaluation,

13 Example Security Metrics-Driven Evaluation, For suggestion please contact me at For suggestion please contact me at

14 Example Security Metrics-Driven Evaluation, Also you can share the yoga exercise to your friends via and SMS. Also you can share the yoga exercise to your friends via and SMS. a sub resource of Contacts share semantically equivalent to send

15 Evaluation Results PERMISSION READ CONTACTS READ CALENDAR RECORD AUDIO No. of Apps Sent. Permission Sentences Annotate d Precisio n Recall F-Score TOTAL

16 Evaluation Results Contd. PERMISSION Delta Precision Delta Recall Delta F-score Delta Accuracy READ CONTACTS READ CALENDAR RECORD AUDIO TOTAL

17 Improvement Better NLP infrastructure Better Semantic Representation of Permissions Blow into the microphone to extinguish candle record calls

18 Future Work refine the NLP infrastructure input from the third-party mobile developers propose security metrics (Transparency Metrics) quantifying the degree to which an application description describes the privacy and security sensitive operations

19 Industrial Collaboration Text analytics for security Text construction for security Repository of textual artifacts for security

20 Summary Our evaluation results show that WHYPER achieves an average precision of 82.8%, and an average recall of 81.5% for three permissions. In summary, our results demonstrate great promise in using NLP techniques to access security risks in mobile applications.

Tutorial: Text Analytics for Security

Tutorial: Text Analytics for Security Tutorial: Text Analytics for Security Tao Xie University of Illinois at Urbana-Champaign http://taoxie.cs.illinois.edu/ taoxie@illinois.edu William Enck North Carolina State University http://www.enck.org

More information

ABSTRACT. PANDITA, RAHUL. Inferring Semantic Information from Natural-Language Software Artifacts. (Under the direction of Laurie Williams.

ABSTRACT. PANDITA, RAHUL. Inferring Semantic Information from Natural-Language Software Artifacts. (Under the direction of Laurie Williams. ABSTRACT PANDITA, RAHUL. Inferring Semantic Information from Natural-Language Software Artifacts. (Under the direction of Laurie Williams.) Specifications play and important role in software engineering

More information

Lecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical

Lecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical Lecture 08 Android Permissions Demystified Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner Operating Systems Practical 20 November, 2013 OSP Lecture 08, Android Permissions Demystified

More information

Ontology- and Bayesian- based Information Security Risk Management

Ontology- and Bayesian- based Information Security Risk Management Ontology- and Bayesian- based Information Security Risk Management Stefan Fenz sfenz@securit 4 th ETSI Security Workshop 13 14 January 2009 ETSI, Sophia Antipolis, France Motivation Almost every business

More information

WHYPER: Towards Automating Risk Assessment of Mobile Applications

WHYPER: Towards Automating Risk Assessment of Mobile Applications WHYPER: Twards Autmating Risk Assessment f Mbile Applicatins Rahul Pandita, Xusheng Xia, Wei Yang, William Enck, and Ta Xie Department f Cmputer Science Nrth Carlina State University University f Illinis

More information

COLLABORATE INTERFACE QUICK START GUIDE

COLLABORATE INTERFACE QUICK START GUIDE Collaborate Ultra is an interactive collaboration tool that integrates into ulearn. This quick start guide is for students, who join as Participants, to become familiar with the Collaborate Interface.

More information

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices W I S S E N T E C H N I K L E I D E N S C H A F T PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices IAIK, Graz University of Technology, Austria www.iaik.tugraz.at 2 Outline Introduction

More information

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, Engin Kirda 02/23/2016 Android 2015

More information

ONSIGHT HOW TO: USE EXTERNAL GUEST INVITES WITH A CUSTOMER WHAT THE INVITER NEEDS TO KNOW

ONSIGHT HOW TO: USE EXTERNAL GUEST INVITES WITH A CUSTOMER WHAT THE INVITER NEEDS TO KNOW ONSIGHT HOW TO: USE EXTERNAL GUEST INVITES WITH A CUSTOMER This step-by-step guide features how to conduct an Onsight collaboration session using an external guest invite. The steps highlight what the

More information

Eclipse Support for Using Eli and Teaching Programming Languages

Eclipse Support for Using Eli and Teaching Programming Languages Electronic Notes in Theoretical Computer Science 141 (2005) 189 194 www.elsevier.com/locate/entcs Eclipse Support for Using Eli and Teaching Programming Languages Anthony M. Sloane 1,2 Department of Computing

More information

Analysis of User Sentiments in App Reviews Coding Guide V4

Analysis of User Sentiments in App Reviews Coding Guide V4 Analysis of User Sentiments in App Reviews Coding Guide V4 Thank you for helping us with our study! Your show thetask (called coding task) is to read user reviews from the Apple and Google Play app stores

More information

Visual Query Suggestion

Visual Query Suggestion Visual Query Suggestion Zheng-Jun Zha, Linjun Yang, Tao Mei, Meng Wang, Zengfu Wang University of Science and Technology of China Textual Visual Query Suggestion Microsoft Research Asia Motivation Framework

More information

Privacy, Law, and Smartphones

Privacy, Law, and Smartphones CyLab Privacy, Law, and Smartphones Engineering & Public Policy acy & Secur ity Priv e l :// C DU HT TP ratory bo La Oct. 29, 2015 CyLab U sab Rebecca Balebako U P S.C S.C M U.E 1 Agenda Quiz Reading discussion

More information

The Web Browser Personalization with the Client Side Triplestore. Canon Inc., W3C/MIT: Hitoshi Uchida

The Web Browser Personalization with the Client Side Triplestore. Canon Inc., W3C/MIT: Hitoshi Uchida The Web Browser Personalization with the Client Side Triplestore Canon Inc., W3C/MIT: Hitoshi Uchida Issue #1 : Silos of Current Web Services Productive web services All done with web browsers Document,

More information

MITATE: Mobile Internet Testbed for Application Traffic Experimentation

MITATE: Mobile Internet Testbed for Application Traffic Experimentation MITATE: Mobile Internet Testbed for Application Traffic Experimentation Utkarsh Goel, Ajay Miyyapuram, Mike P. Wittie, Qing Yang Montana State University - Bozeman November 25 th, 2013 Computer Science

More information

Free for All! Assessing User Data Exposure to Advertising Libraries on Android

Free for All! Assessing User Data Exposure to Advertising Libraries on Android Free for All! Assessing User Data Exposure to Advertising Libraries on Android Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl Gunter University of Illinois at Urbana - Champaign Approach

More information

Quick Reference Guide

Quick Reference Guide Quick Reference Guide 1 First-Time Employee Registration 1. Open a browser and go to: adcomm.highfive.com 2. Choose Download Highfive App Choose run when the download starts 3. Choose open the Highfive

More information

MOBILE DEFEND. Powering Robust Mobile Security Solutions

MOBILE DEFEND. Powering Robust Mobile Security Solutions MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile

More information

Threat Centric Vulnerability Management

Threat Centric Vulnerability Management Threat Centric Vulnerability Management Solution Brief When it comes to vulnerability management, security leaders continue struggle to identify which of the thousands even millions of vulnerabilities

More information

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation FEAST 2017 ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation Ke Tian*, Gang Tan^, Daphne Yao*, Barbara Ryder* *Department of Computer Science Virginia Tech ^Department of CSE Penn

More information

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics

More information

Ranked Retrieval. Evaluation in IR. One option is to average the precision scores at discrete. points on the ROC curve But which points?

Ranked Retrieval. Evaluation in IR. One option is to average the precision scores at discrete. points on the ROC curve But which points? Ranked Retrieval One option is to average the precision scores at discrete Precision 100% 0% More junk 100% Everything points on the ROC curve But which points? Recall We want to evaluate the system, not

More information

Quick Reference Guide WebEx on an Android Tablet

Quick Reference Guide WebEx on an Android Tablet Quick Reference Guide WebEx on an Android Tablet Install WebEx Meetings for an Android Tablet In order to schedule and attend WebEx meetings from your Android Tablet you need to download, install and activate

More information

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks WHITEPAPER Lookout Mobile Endpoint Security for App Risks The emerging risk around leaky and noncompliant mobile apps As organizations are increasingly embracing mobile devices in the workplace, mobile

More information

Android. Studies on Risk Level Evaluation Schemes using APK Metadata

Android. Studies on Risk Level Evaluation Schemes using APK Metadata Computer Security Symposium 2015 21-23 October 2015 Android 184-8795 4-2-1 takeshi takahashi@nict.go.jp 102-0083 2-6-7 RK 4F Android Android Package (APK) APK ( ) APK Web APK area under curve APK Studies

More information

AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android

AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android Paul Pearce 1, Adrienne Porter Felt 1, Gabriel Nunez 2, David Wagner 1 1 University of California, Berkeley 2 Sandia Na,onal Laboratory

More information

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Description: FILE SERVERS - THE BACKBONE OF THE NETWORK File servers are not just a network repository for the company

More information

Actionable User Intentions for Real-Time Mobile Assistant Applications

Actionable User Intentions for Real-Time Mobile Assistant Applications Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,

More information

VoiceThread QuickGuide: Commenting

VoiceThread QuickGuide: Commenting VoiceThread QuickGuide: Commenting Overview Commenting is one of the core features of VoiceThread. By recording, sharing and viewing comments, participants can present, discuss and exchange ideas. In a

More information

RingCentral Meetings QuickStart Guide

RingCentral Meetings QuickStart Guide RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-to-face online meetings in high definition. Share your screen, websites, documents,

More information

Implementation of Handling Android Application using SMS (Short Message Service)

Implementation of Handling Android Application using SMS (Short Message Service) Implementation of Handling Android Application using SMS (Short Message Service) Sagar Pise 1, Raj Moundekar 2, Rakshita Meshram 3, Sakshi Mohadikar 4, Roshni Durugwar 5, Dinesh Banabakode 6 1TeamLeader

More information

RingCentral Meetings QuickStart Guide

RingCentral Meetings QuickStart Guide RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-to-face online meetings in high definition. Share your screen, websites, documents,

More information

Splunk Review. 1. Introduction

Splunk Review. 1. Introduction Splunk Review 1. Introduction 2. Splunk Splunk is a software tool for searching, monitoring and analysing machine generated data via web interface. It indexes and correlates real-time and non-real-time

More information

Building on to the Digital Preservation Foundation at Harvard Library. Andrea Goethals ABCD-Library Meeting June 27, 2016

Building on to the Digital Preservation Foundation at Harvard Library. Andrea Goethals ABCD-Library Meeting June 27, 2016 Building on to the Digital Preservation Foundation at Harvard Library Andrea Goethals ABCD-Library Meeting June 27, 2016 What do we already have? What do we still need? Where I ll focus DIGITAL PRESERVATION

More information

Should the users be informed? Differences in risk perception between Android and iphone users

Should the users be informed? Differences in risk perception between Android and iphone users Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security

More information

First-Time Employee Registration

First-Time Employee Registration How to HighFive 1 First-Time Employee Registration 1. Open a browser and go to: adcomm.highfive.com 2. Choose Download Highfive App Choose run when the download starts 3. Choose open the Highfive App 4.

More information

Learners App Guide. Version 1.0

Learners App Guide. Version 1.0 Learners App Guide Version 1.0 08 March 2018 1. Introduction... 1 2. Downloading the App... 1 3. Logging In... 1 4. Home Screen... 2 5. Syncing... 2 6. Plans... 3 7. Assessments... 3 7.1. Adding Criteria

More information

RingCentral Meetings QuickStart Guide

RingCentral Meetings QuickStart Guide RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-toface online meetings in high definition. Share your screen, websites, documents,

More information

ITP 342 Mobile App Development. APIs

ITP 342 Mobile App Development. APIs ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually

More information

Security and privacy in the smartphone ecosystem: Final progress report

Security and privacy in the smartphone ecosystem: Final progress report Security and privacy in the smartphone ecosystem: Final progress report Alexios Mylonas Athens University of Economics & Business Overview 2 Research Motivation Related work Objective Approach Methodology

More information

InHealth Dashboard. User Instructions. Accessing Your InHealth Dashboard. Navigating Your Dashboard

InHealth Dashboard. User Instructions. Accessing Your InHealth Dashboard. Navigating Your Dashboard InHealth Dashboard User Instructions Accessing Your InHealth Dashboard Go to www.myinterrahealth.com and enter your Participant ID, password, and Company ID. Please refer to your program handout if you

More information

ZOOM Video Conferencing: Quick Start Guide

ZOOM Video Conferencing: Quick Start Guide ZOOM Video Conferencing: Quick Start Guide Welcome to Zoom at James Cook University (JCU), a video conferencing system designed to enhance your communication and collaboration with colleagues, students

More information

On the automatic classification of app reviews

On the automatic classification of app reviews Requirements Eng (2016) 21:311 331 DOI 10.1007/s00766-016-0251-9 RE 2015 On the automatic classification of app reviews Walid Maalej 1 Zijad Kurtanović 1 Hadeer Nabil 2 Christoph Stanik 1 Walid: please

More information

Search Engine Architecture. Hongning Wang

Search Engine Architecture. Hongning Wang Search Engine Architecture Hongning Wang CS@UVa CS@UVa CS4501: Information Retrieval 2 Document Analyzer Classical search engine architecture The Anatomy of a Large-Scale Hypertextual Web Search Engine

More information

This tool is actually pretty unique and has evolved over the last 7 years. I have been working with Adobe Connect for quite awhile now and one of the

This tool is actually pretty unique and has evolved over the last 7 years. I have been working with Adobe Connect for quite awhile now and one of the 1 2 This tool is actually pretty unique and has evolved over the last 7 years. I have been working with Adobe Connect for quite awhile now and one of the things that I have noticed is that they do tend

More information

Text Message By William Malmborg READ ONLINE

Text Message By William Malmborg READ ONLINE Text Message By William Malmborg READ ONLINE Learn more about sending and receiving text messages, photos, personal effects and more with the Messages app on your iphone, ipad, Apple Watch, and Mac. 9/3/2016

More information

Collaborate App for Android Smartphones

Collaborate App for Android Smartphones Collaborate App for Android Smartphones The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on the go. The app comes in 3 versions: Collaborate - Mobile Collaborate

More information

Barracuda Cloud Archiving Service Mobile Application for Android

Barracuda Cloud Archiving Service Mobile Application for Android Barracuda Cloud Archiving Service Mobile Application for Android Requirements: Latest Android Message Archive application available for download from the Google Play Store. Android device running software

More information

Offered in Partnership with

Offered in Partnership with Offered in Partnership with Collaboration in the Classroom: An introduction to Google Apps EDCI 643-002 Instructor: Matt England Email - matt.england@techtalkpd.com Google Account (for sharing documents)

More information

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their

More information

Mining Android App Descriptions for Permission Requirements Recommendation

Mining Android App Descriptions for Permission Requirements Recommendation 2018 IEEE 26th International Requirements Engineering Conference Mining Android App Descriptions for Permission Requirements Recommendation Xueqing Liu, Yue Leng Department of Computer Science University

More information

Ranking Vulnerability for Web Application based on Severity Ratings Analysis

Ranking Vulnerability for Web Application based on Severity Ratings Analysis Ranking Vulnerability for Web Application based on Severity Ratings Analysis Nitish Kumar #1, Kumar Rajnish #2 Anil Kumar #3 1,2,3 Department of Computer Science & Engineering, Birla Institute of Technology,

More information

ELLUCIAN GO HOW-TO GUIDE

ELLUCIAN GO HOW-TO GUIDE ELLUCIAN GO HOW-TO GUIDE 03.31.17 CONTENTS GET THE ELLUCIAN GO APP... CHOOSE ACM AS YOUR SCHOOL... SIGN IN... ELLUCIAN GO MENU... REGISTER FOR COURSES... MY SCHEDULE... MY GRADES... MY FINANCIALS... ACADEMICS

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

CS6200 Information Retrieval. Jesse Anderton College of Computer and Information Science Northeastern University

CS6200 Information Retrieval. Jesse Anderton College of Computer and Information Science Northeastern University CS6200 Information Retrieval Jesse Anderton College of Computer and Information Science Northeastern University Major Contributors Gerard Salton! Vector Space Model Indexing Relevance Feedback SMART Karen

More information

International Journal for Management Science And Technology (IJMST)

International Journal for Management Science And Technology (IJMST) Volume 4; Issue 03 Manuscript- 1 ISSN: 2320-8848 (Online) ISSN: 2321-0362 (Print) International Journal for Management Science And Technology (IJMST) GENERATION OF SOURCE CODE SUMMARY BY AUTOMATIC IDENTIFICATION

More information

ShowNTell - An easy-to-use tool for answering students questions with voiceover

ShowNTell - An easy-to-use tool for answering students questions with voiceover + ShowNTell - An easy-to-use tool for answering students questions with voiceover recording Dr BHOJAN ANAND LIFT & TEG Grant: Start date: June 2014 End date: Dec 2015 + ShowNTell Problem Statement & Motivation

More information

Collaborate App for Android Tablets

Collaborate App for Android Tablets The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on your Android tablet on the go. The Collaborate app for Android tablets provides these communication

More information

RingCentral Office Premium Edition

RingCentral Office Premium Edition RingCentral Datasheet RingCentral Office Premium Edition RingCentral Office Premium Edition Empower your business to communicate, collaborate, and connect via voice, team messaging and collaboration, audio

More information

Building a Next- Generation App Store. Jason Franklin Ph.D. Research Associate Stanford University

Building a Next- Generation App Store. Jason Franklin Ph.D. Research Associate Stanford University Building a Next- Generation App Store Jason Franklin Ph.D. jfrankli@cs.stanford.edu Research Associate Stanford University App Store: Promise Safe, Trusted, Centralized??! :)??! App Stores: Reality "Permissions

More information

Using the Mobile App for Defense Connect Online

Using the Mobile App for Defense Connect Online Using the Mobile App for Defense Connect Online Conduct and Attend Meetings Virtually Anywhere AUTHOR Aaron W Wolf DCO Evangelist Carahsoft Technology Corp. 703.889.9781 aaron.w.wolf@carahsoft.com Defense

More information

Contextion: A Framework for Developing Context-Aware Mobile Applications

Contextion: A Framework for Developing Context-Aware Mobile Applications Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract

More information

WebEx. Web Conferencing Tool. Fordham IT

WebEx. Web Conferencing Tool. Fordham IT WebEx Web Conferencing Tool STUDENT User Guide Fordham IT Contents WebEx Student User Guide Schedule a Meeting Using the WebEx Meeting Site 1 WebEx Scheduling Template 2 Join a Meeting 4 Participate in

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

A Review of Kids Tutor

A Review of Kids Tutor A Review of Kids Tutor Monali Kumbhare, Ashwini Rajput, Bhavna Daswani Department of CSE, Jhulelal Institute of Technology,Lonara Nagpur Prof. Priyanka Dudhe Assistant Professor, Department of CSE, Jhulelal

More information

ESChat Quick Start Guide

ESChat Quick Start Guide ESChat Quick Start Guide for Android Devices January 19, 2016 1 - ESChat Android Quick Start Guide For ESChat version 19.1 or greater 2 - ESChat Android Quick Start Guide Activating ESChat First Time Installation

More information

Automatized Generating of GUIs for Domain-Specific Languages

Automatized Generating of GUIs for Domain-Specific Languages Automatized Generating of GUIs for Domain-Specific Languages Michaela Bačíková, Dominik Lakatoš, and Milan Nosáľ Technical University of Košice, Letná 9, 04200 Košice, Slovakia, (michaela.bacikova, dominik.lakatos,

More information

Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints

Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints Mohammad Nauman Institute of Management Sciences, Pakistan nauman@imsciences.edu.pk Sohail Khan School of

More information

SOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk.

SOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. RiskSense Platform RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 27 RiskSense, Inc. Executive Summary The RiskSense Platform is a Software-as-a-Service

More information

Organizing and Managing Grassroots Enterprise Mashup Environments. Doctorial Thesis, 24 th June, Volker Hoyer

Organizing and Managing Grassroots Enterprise Mashup Environments. Doctorial Thesis, 24 th June, Volker Hoyer Organizing and Managing Grassroots Enterprise Mashup Environments Doctorial Thesis, 24 th June, 2010 Volker Hoyer Motivation and Research Questions Research Design Results Conclusion Motivation and Research

More information

EIM at the FAA: Translating Semantic Technologies into Direct User Benefit

EIM at the FAA: Translating Semantic Technologies into Direct User Benefit Global Information Management EIM at the FAA: Translating Semantic Technologies into Direct User Benefit Presented By: Deborah Cowell & John Eberhardt Date: August 27, 2015 What is EIM? Enterprise Information

More information

SAS Model Manager 2.2. Tutorials

SAS Model Manager 2.2. Tutorials SAS Model Manager 2.2 Tutorials The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS Model Manager 2.2: Tutorials. Cary, NC: SAS Institute Inc. SAS Model Manager

More information

Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects

Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects 1.0. Project team There should be a clear indication of who is responsible for the publication of the project.

More information

What FinAid offices need to know about cyberattacks. Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, EST

What FinAid offices need to know about cyberattacks. Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, EST What FinAid offices need to know about cyberattacks Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, 2016 @12pm EST BY 2014, OVER 1 BILLION PERSONAL DATA RECORDS HAD BEEN COMPROMISED

More information

Semantic MediaWiki (SMW) for Scientific Literature Management

Semantic MediaWiki (SMW) for Scientific Literature Management Semantic MediaWiki (SMW) for Scientific Literature Management Bahar Sateli, René Witte Semantic Software Lab Department of Computer Science and Software Engineering Concordia University, Montréal SMWCon

More information

How GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics. Jan Neumann Comcast Labs DC May 10th, 2017

How GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics. Jan Neumann Comcast Labs DC May 10th, 2017 How GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics Jan Neumann Comcast Labs DC May 10th, 2017 Comcast Applied Artificial Intelligence Lab Media & Video Analytics Smart TV Deep Learning

More information

Predictive Analytics using Teradata Aster Scoring SDK

Predictive Analytics using Teradata Aster Scoring SDK Predictive Analytics using Teradata Aster Scoring SDK Faraz Ahmad Software Engineer, Teradata #TDPARTNERS16 GEORGIA WORLD CONGRESS CENTER At Teradata, we believe. Analytics and data unleash the potential

More information

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY?

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in

More information

Looking Forward: Challenges in Mobile Security. John Mitchell Stanford University

Looking Forward: Challenges in Mobile Security. John Mitchell Stanford University Looking Forward: Challenges in Mobile Security John Mitchell Stanford University Outline Mobile platform security SessionJuggler Using phone as authentication token SelectiveAuth Protecting resources on

More information

Google Hangout Lin Zhong

Google Hangout Lin Zhong Tutorial on Google Hangout, Fall, 2012. 1 Page Google Hangout Lin Zhong This tutorial will demonstrate how to make video chat with more than one people at once and how to share screen and video with group

More information

Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site:

Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site: 1 Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site: http://usfca.zoom.us Click on the link Download Zoom on the upper right side of the page and then click on the link for

More information

Getting Started with Lync 2010 for iphone

Getting Started with Lync 2010 for iphone Getting Started with Lync 2010 for iphone Getting started with Lync 2010 on the iphone» Requirements» Installing Lync» Removing Lync» Signing in to Lync» Signing out of Lync Requirements iphone 3GS, iphone

More information

Attached is a list of the required apps that need to be purchased for the 2015 school year.

Attached is a list of the required apps that need to be purchased for the 2015 school year. POINT COOK PREP-YEAR 9 COLLEGE 18-50 PONSFORD DRIVE PO BOX 6497 POINT COOK 3030 Telephone +613 8348 7100 Fax +613 8348 7199 Email point.cook.p9.co@edumail.vic.gov.au December 17, 2014 Dear Parents and

More information

NPR.ORG - PRIVACY POLICY

NPR.ORG - PRIVACY POLICY Effective Date February 06, 2013 See related: NPR Terms of Use At NPR, we recognize the importance of privacy to visitors of NPR.org, NPR's mobile sites and applications, NPR's interactive voice response

More information

Smart Protection Network. Raimund Genes, CTO

Smart Protection Network. Raimund Genes, CTO Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000

More information

Medici for Digital Cultural Heritage Libraries. George Tsouloupas, PhD The LinkSCEEM Project

Medici for Digital Cultural Heritage Libraries. George Tsouloupas, PhD The LinkSCEEM Project Medici for Digital Cultural Heritage Libraries George Tsouloupas, PhD The LinkSCEEM Project Overview of Digital Libraries A Digital Library: "An informal definition of a digital library is a managed collection

More information

Accession Meeting. Quick Reference Guide. for UCaaS+

Accession Meeting. Quick Reference Guide. for UCaaS+ Accession Meeting Quick Reference Guide for UCaaS+ Version 1.0 June 30, 2017 Revision History Revision Date Description Initials 1.0 6/30/17 First published version. CS Purpose Use this quick reference

More information

How to Use Voicethread

How to Use Voicethread How to Use Voicethread October 13, 2016 Julie K. Marsh Coordinator for Distance Education and Instructional Design Need Help? Contact Julie at 804-627-5308 or send an email to julie_marsh@bshsi.org Contents

More information

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<<

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<< Iphone Setting Privacy Microphone Viber Set To On In privacy setting i don't find facetime accessing microphone. iphone 4S Again while using viber, if I set it to loud speaker, rare end doesn't hear my

More information

Semantic Web Applications and the Semantic Web in 10 Years. Based on work of Grigoris Antoniou, Frank van Harmelen

Semantic Web Applications and the Semantic Web in 10 Years. Based on work of Grigoris Antoniou, Frank van Harmelen Semantic Web Applications and the Semantic Web in 10 Years Based on work of Grigoris Antoniou, Frank van Harmelen Semantic Web Search Engines Charting the web Charting the web Limitations of Swoogle Very

More information

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases LIDER Survey Overview Participant profile (organisation type, industry sector) Relevant use-cases Discovering and extracting information Understanding opinion Content and data (Data Management) Monitoring

More information

Welcome to the Digital connections Setup for the Media Manager using the Axium AX400/AX800 Legacy amplifiers. Audio &Control Systems

Welcome to the Digital connections Setup for the Media Manager using the Axium AX400/AX800 Legacy amplifiers. Audio &Control Systems Welcome to the Digital Setup for the Media Manager using the Axium AX400/AX800 Legacy amplifiers Ensure that either the AX400/AX800 and the Media Manager are connected to the same Network switch and are

More information

TEXT MINING: THE NEXT DATA FRONTIER

TEXT MINING: THE NEXT DATA FRONTIER TEXT MINING: THE NEXT DATA FRONTIER An Infrastructural Approach Dr. Petr Knoth CORE (core.ac.uk) Knowledge Media institute, The Open University United Kingdom 2 OpenMinTeD Establish an open and sustainable

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

TOP ETF PICKS PRIVACY NOTICE Last updated October 2018

TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 INTRODUCTION Thank you for choosing to be part of our community at TopETFpicks ( company, we, us, or our ). We are committed to protecting your personal

More information

SASKTEL INTEGRATED BUSINESS COMMUNICATIONS (IBC)

SASKTEL INTEGRATED BUSINESS COMMUNICATIONS (IBC) SASKTEL INTEGRATED BUSINESS COMMUNICATIONS (IBC) MOBILE CLIENT USER GUIDE June 2017 Version 1 TABLE OF CONTENTS Download the IBC Mobile Client Application... 3 Presence Status... 3 Contacts Tab... 3 Placing

More information

On Understanding Permission Usage Contextuality in Android Apps

On Understanding Permission Usage Contextuality in Android Apps On Understanding Permission Usage Contextuality in Android Apps Md Zakir Hossen and Mohammad Mannan Concordia Institute of Information Systems Engineering Concordia University, Montreal, Canada {m osssen,mmannan}@ciise.concordia.ca

More information

The Cloud Meeting Company

The Cloud Meeting Company The Cloud Meeting Company Cloud Meetings 2015 Cloud Meetings 1980 s 1990 s 2000 s Cloud Video Conferencing Telephone Conferencing Hardware Video Conferencing Online Meetings Group Messaging Simple Online

More information

Getting Started for Moderators Quick Reference Guide

Getting Started for Moderators Quick Reference Guide Practice before leading your first session. Become familiar with the session content. Open web pages, applications needed for application sharing and screen captures before session begins. Load multimedia

More information

Platform Architecture Overview

Platform Architecture Overview Platform Architecture Overview Platform overview How-to example Platform components detailed Mediation infrastructure VAS USER container Architecture: overall Backend platform Container Persistence External

More information