Automated Assessment of Security Risks for Mobile Applications
|
|
- Anna Gordon
- 6 years ago
- Views:
Transcription
1 Automated Assessment of Security Risks for Mobile Applications Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie Department of Computer Science North Carolina State University
2
3 Lookout Mobile Security has reported that android malware resulted in a loss of US $1 million in Source:
4 F-Secure MOBILE THREAT REPORT Q Source :
5 Approach to Mobile Apps Distribution Open system Developer releases the App on Play Store Users can directly install the Apps Google Inc. SECURITY User has to explicitly grant permissions requested by the App
6 Problem Felt, Adrienne Porter, et al. "Android permissions: User attention, comprehension, and behavior." Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, Only 17% users (participating in the study) paid attention to permissions.
7 Motivations of Recent Android Malware "Yet another modification of the Google Android Snake game. This one listens to the taps for its turn directions." Source:
8 Solution
9 Simple Solution: Keyword-based search Keyword-based search on application descriptions Photo Credit: Ahora estoy en via Flickr
10 Problems with Keyword-based Search Confounding effects: Certain keywords such as contact have a confounding meaning... displays user contact,... contact me at abc@xyz.com Semantic Inference: Sentences often describe a sensitive operation such as reading contacts without actually referring to keyword contact. share yoga exercises with your friends via , sms.
11 WHYPER Implementation APP Description WHYPER APP Permission NLP Parser Semantic Engine Annotated Description API Docs
12 Example Security Metrics-Driven Evaluation,
13 Example Security Metrics-Driven Evaluation, For suggestion please contact me at For suggestion please contact me at
14 Example Security Metrics-Driven Evaluation, Also you can share the yoga exercise to your friends via and SMS. Also you can share the yoga exercise to your friends via and SMS. a sub resource of Contacts share semantically equivalent to send
15 Evaluation Results PERMISSION READ CONTACTS READ CALENDAR RECORD AUDIO No. of Apps Sent. Permission Sentences Annotate d Precisio n Recall F-Score TOTAL
16 Evaluation Results Contd. PERMISSION Delta Precision Delta Recall Delta F-score Delta Accuracy READ CONTACTS READ CALENDAR RECORD AUDIO TOTAL
17 Improvement Better NLP infrastructure Better Semantic Representation of Permissions Blow into the microphone to extinguish candle record calls
18 Future Work refine the NLP infrastructure input from the third-party mobile developers propose security metrics (Transparency Metrics) quantifying the degree to which an application description describes the privacy and security sensitive operations
19 Industrial Collaboration Text analytics for security Text construction for security Repository of textual artifacts for security
20 Summary Our evaluation results show that WHYPER achieves an average precision of 82.8%, and an average recall of 81.5% for three permissions. In summary, our results demonstrate great promise in using NLP techniques to access security risks in mobile applications.
Tutorial: Text Analytics for Security
Tutorial: Text Analytics for Security Tao Xie University of Illinois at Urbana-Champaign http://taoxie.cs.illinois.edu/ taoxie@illinois.edu William Enck North Carolina State University http://www.enck.org
More informationABSTRACT. PANDITA, RAHUL. Inferring Semantic Information from Natural-Language Software Artifacts. (Under the direction of Laurie Williams.
ABSTRACT PANDITA, RAHUL. Inferring Semantic Information from Natural-Language Software Artifacts. (Under the direction of Laurie Williams.) Specifications play and important role in software engineering
More informationLecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical
Lecture 08 Android Permissions Demystified Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner Operating Systems Practical 20 November, 2013 OSP Lecture 08, Android Permissions Demystified
More informationOntology- and Bayesian- based Information Security Risk Management
Ontology- and Bayesian- based Information Security Risk Management Stefan Fenz sfenz@securit 4 th ETSI Security Workshop 13 14 January 2009 ETSI, Sophia Antipolis, France Motivation Almost every business
More informationWHYPER: Towards Automating Risk Assessment of Mobile Applications
WHYPER: Twards Autmating Risk Assessment f Mbile Applicatins Rahul Pandita, Xusheng Xia, Wei Yang, William Enck, and Ta Xie Department f Cmputer Science Nrth Carlina State University University f Illinis
More informationCOLLABORATE INTERFACE QUICK START GUIDE
Collaborate Ultra is an interactive collaboration tool that integrates into ulearn. This quick start guide is for students, who join as Participants, to become familiar with the Collaborate Interface.
More informationPIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices
W I S S E N T E C H N I K L E I D E N S C H A F T PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices IAIK, Graz University of Technology, Austria www.iaik.tugraz.at 2 Outline Introduction
More informationCuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, Engin Kirda 02/23/2016 Android 2015
More informationONSIGHT HOW TO: USE EXTERNAL GUEST INVITES WITH A CUSTOMER WHAT THE INVITER NEEDS TO KNOW
ONSIGHT HOW TO: USE EXTERNAL GUEST INVITES WITH A CUSTOMER This step-by-step guide features how to conduct an Onsight collaboration session using an external guest invite. The steps highlight what the
More informationEclipse Support for Using Eli and Teaching Programming Languages
Electronic Notes in Theoretical Computer Science 141 (2005) 189 194 www.elsevier.com/locate/entcs Eclipse Support for Using Eli and Teaching Programming Languages Anthony M. Sloane 1,2 Department of Computing
More informationAnalysis of User Sentiments in App Reviews Coding Guide V4
Analysis of User Sentiments in App Reviews Coding Guide V4 Thank you for helping us with our study! Your show thetask (called coding task) is to read user reviews from the Apple and Google Play app stores
More informationVisual Query Suggestion
Visual Query Suggestion Zheng-Jun Zha, Linjun Yang, Tao Mei, Meng Wang, Zengfu Wang University of Science and Technology of China Textual Visual Query Suggestion Microsoft Research Asia Motivation Framework
More informationPrivacy, Law, and Smartphones
CyLab Privacy, Law, and Smartphones Engineering & Public Policy acy & Secur ity Priv e l :// C DU HT TP ratory bo La Oct. 29, 2015 CyLab U sab Rebecca Balebako U P S.C S.C M U.E 1 Agenda Quiz Reading discussion
More informationThe Web Browser Personalization with the Client Side Triplestore. Canon Inc., W3C/MIT: Hitoshi Uchida
The Web Browser Personalization with the Client Side Triplestore Canon Inc., W3C/MIT: Hitoshi Uchida Issue #1 : Silos of Current Web Services Productive web services All done with web browsers Document,
More informationMITATE: Mobile Internet Testbed for Application Traffic Experimentation
MITATE: Mobile Internet Testbed for Application Traffic Experimentation Utkarsh Goel, Ajay Miyyapuram, Mike P. Wittie, Qing Yang Montana State University - Bozeman November 25 th, 2013 Computer Science
More informationFree for All! Assessing User Data Exposure to Advertising Libraries on Android
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl Gunter University of Illinois at Urbana - Champaign Approach
More informationQuick Reference Guide
Quick Reference Guide 1 First-Time Employee Registration 1. Open a browser and go to: adcomm.highfive.com 2. Choose Download Highfive App Choose run when the download starts 3. Choose open the Highfive
More informationMOBILE DEFEND. Powering Robust Mobile Security Solutions
MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile
More informationThreat Centric Vulnerability Management
Threat Centric Vulnerability Management Solution Brief When it comes to vulnerability management, security leaders continue struggle to identify which of the thousands even millions of vulnerabilities
More informationReDroid: Prioritizing Data Flows and Sinks for App Security Transformation
FEAST 2017 ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation Ke Tian*, Gang Tan^, Daphne Yao*, Barbara Ryder* *Department of Computer Science Virginia Tech ^Department of CSE Penn
More informationSAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide
SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics
More informationRanked Retrieval. Evaluation in IR. One option is to average the precision scores at discrete. points on the ROC curve But which points?
Ranked Retrieval One option is to average the precision scores at discrete Precision 100% 0% More junk 100% Everything points on the ROC curve But which points? Recall We want to evaluate the system, not
More informationQuick Reference Guide WebEx on an Android Tablet
Quick Reference Guide WebEx on an Android Tablet Install WebEx Meetings for an Android Tablet In order to schedule and attend WebEx meetings from your Android Tablet you need to download, install and activate
More informationWHITEPAPER. Lookout Mobile Endpoint Security for App Risks
WHITEPAPER Lookout Mobile Endpoint Security for App Risks The emerging risk around leaky and noncompliant mobile apps As organizations are increasingly embracing mobile devices in the workplace, mobile
More informationAndroid. Studies on Risk Level Evaluation Schemes using APK Metadata
Computer Security Symposium 2015 21-23 October 2015 Android 184-8795 4-2-1 takeshi takahashi@nict.go.jp 102-0083 2-6-7 RK 4F Android Android Package (APK) APK ( ) APK Web APK area under curve APK Studies
More informationAdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android
AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android Paul Pearce 1, Adrienne Porter Felt 1, Gabriel Nunez 2, David Wagner 1 1 University of California, Berkeley 2 Sandia Na,onal Laboratory
More informationGet BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]
Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ] Description: FILE SERVERS - THE BACKBONE OF THE NETWORK File servers are not just a network repository for the company
More informationActionable User Intentions for Real-Time Mobile Assistant Applications
Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,
More informationVoiceThread QuickGuide: Commenting
VoiceThread QuickGuide: Commenting Overview Commenting is one of the core features of VoiceThread. By recording, sharing and viewing comments, participants can present, discuss and exchange ideas. In a
More informationRingCentral Meetings QuickStart Guide
RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-to-face online meetings in high definition. Share your screen, websites, documents,
More informationImplementation of Handling Android Application using SMS (Short Message Service)
Implementation of Handling Android Application using SMS (Short Message Service) Sagar Pise 1, Raj Moundekar 2, Rakshita Meshram 3, Sakshi Mohadikar 4, Roshni Durugwar 5, Dinesh Banabakode 6 1TeamLeader
More informationRingCentral Meetings QuickStart Guide
RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-to-face online meetings in high definition. Share your screen, websites, documents,
More informationSplunk Review. 1. Introduction
Splunk Review 1. Introduction 2. Splunk Splunk is a software tool for searching, monitoring and analysing machine generated data via web interface. It indexes and correlates real-time and non-real-time
More informationBuilding on to the Digital Preservation Foundation at Harvard Library. Andrea Goethals ABCD-Library Meeting June 27, 2016
Building on to the Digital Preservation Foundation at Harvard Library Andrea Goethals ABCD-Library Meeting June 27, 2016 What do we already have? What do we still need? Where I ll focus DIGITAL PRESERVATION
More informationShould the users be informed? Differences in risk perception between Android and iphone users
Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security
More informationFirst-Time Employee Registration
How to HighFive 1 First-Time Employee Registration 1. Open a browser and go to: adcomm.highfive.com 2. Choose Download Highfive App Choose run when the download starts 3. Choose open the Highfive App 4.
More informationLearners App Guide. Version 1.0
Learners App Guide Version 1.0 08 March 2018 1. Introduction... 1 2. Downloading the App... 1 3. Logging In... 1 4. Home Screen... 2 5. Syncing... 2 6. Plans... 3 7. Assessments... 3 7.1. Adding Criteria
More informationRingCentral Meetings QuickStart Guide
RingCentral Meetings QuickStart Guide RingCentral Meetings empowers your workforce to collaborate from any location with face-toface online meetings in high definition. Share your screen, websites, documents,
More informationITP 342 Mobile App Development. APIs
ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually
More informationSecurity and privacy in the smartphone ecosystem: Final progress report
Security and privacy in the smartphone ecosystem: Final progress report Alexios Mylonas Athens University of Economics & Business Overview 2 Research Motivation Related work Objective Approach Methodology
More informationInHealth Dashboard. User Instructions. Accessing Your InHealth Dashboard. Navigating Your Dashboard
InHealth Dashboard User Instructions Accessing Your InHealth Dashboard Go to www.myinterrahealth.com and enter your Participant ID, password, and Company ID. Please refer to your program handout if you
More informationZOOM Video Conferencing: Quick Start Guide
ZOOM Video Conferencing: Quick Start Guide Welcome to Zoom at James Cook University (JCU), a video conferencing system designed to enhance your communication and collaboration with colleagues, students
More informationOn the automatic classification of app reviews
Requirements Eng (2016) 21:311 331 DOI 10.1007/s00766-016-0251-9 RE 2015 On the automatic classification of app reviews Walid Maalej 1 Zijad Kurtanović 1 Hadeer Nabil 2 Christoph Stanik 1 Walid: please
More informationSearch Engine Architecture. Hongning Wang
Search Engine Architecture Hongning Wang CS@UVa CS@UVa CS4501: Information Retrieval 2 Document Analyzer Classical search engine architecture The Anatomy of a Large-Scale Hypertextual Web Search Engine
More informationThis tool is actually pretty unique and has evolved over the last 7 years. I have been working with Adobe Connect for quite awhile now and one of the
1 2 This tool is actually pretty unique and has evolved over the last 7 years. I have been working with Adobe Connect for quite awhile now and one of the things that I have noticed is that they do tend
More informationText Message By William Malmborg READ ONLINE
Text Message By William Malmborg READ ONLINE Learn more about sending and receiving text messages, photos, personal effects and more with the Messages app on your iphone, ipad, Apple Watch, and Mac. 9/3/2016
More informationCollaborate App for Android Smartphones
Collaborate App for Android Smartphones The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on the go. The app comes in 3 versions: Collaborate - Mobile Collaborate
More informationBarracuda Cloud Archiving Service Mobile Application for Android
Barracuda Cloud Archiving Service Mobile Application for Android Requirements: Latest Android Message Archive application available for download from the Google Play Store. Android device running software
More informationOffered in Partnership with
Offered in Partnership with Collaboration in the Classroom: An introduction to Google Apps EDCI 643-002 Instructor: Matt England Email - matt.england@techtalkpd.com Google Account (for sharing documents)
More informationDaymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.
Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their
More informationMining Android App Descriptions for Permission Requirements Recommendation
2018 IEEE 26th International Requirements Engineering Conference Mining Android App Descriptions for Permission Requirements Recommendation Xueqing Liu, Yue Leng Department of Computer Science University
More informationRanking Vulnerability for Web Application based on Severity Ratings Analysis
Ranking Vulnerability for Web Application based on Severity Ratings Analysis Nitish Kumar #1, Kumar Rajnish #2 Anil Kumar #3 1,2,3 Department of Computer Science & Engineering, Birla Institute of Technology,
More informationELLUCIAN GO HOW-TO GUIDE
ELLUCIAN GO HOW-TO GUIDE 03.31.17 CONTENTS GET THE ELLUCIAN GO APP... CHOOSE ACM AS YOUR SCHOOL... SIGN IN... ELLUCIAN GO MENU... REGISTER FOR COURSES... MY SCHEDULE... MY GRADES... MY FINANCIALS... ACADEMICS
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno
CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,
More informationCS6200 Information Retrieval. Jesse Anderton College of Computer and Information Science Northeastern University
CS6200 Information Retrieval Jesse Anderton College of Computer and Information Science Northeastern University Major Contributors Gerard Salton! Vector Space Model Indexing Relevance Feedback SMART Karen
More informationInternational Journal for Management Science And Technology (IJMST)
Volume 4; Issue 03 Manuscript- 1 ISSN: 2320-8848 (Online) ISSN: 2321-0362 (Print) International Journal for Management Science And Technology (IJMST) GENERATION OF SOURCE CODE SUMMARY BY AUTOMATIC IDENTIFICATION
More informationShowNTell - An easy-to-use tool for answering students questions with voiceover
+ ShowNTell - An easy-to-use tool for answering students questions with voiceover recording Dr BHOJAN ANAND LIFT & TEG Grant: Start date: June 2014 End date: Dec 2015 + ShowNTell Problem Statement & Motivation
More informationCollaborate App for Android Tablets
The AT&T Collaborate service provides the Collaborate app to help you manage calls and conferences on your Android tablet on the go. The Collaborate app for Android tablets provides these communication
More informationRingCentral Office Premium Edition
RingCentral Datasheet RingCentral Office Premium Edition RingCentral Office Premium Edition Empower your business to communicate, collaborate, and connect via voice, team messaging and collaboration, audio
More informationBuilding a Next- Generation App Store. Jason Franklin Ph.D. Research Associate Stanford University
Building a Next- Generation App Store Jason Franklin Ph.D. jfrankli@cs.stanford.edu Research Associate Stanford University App Store: Promise Safe, Trusted, Centralized??! :)??! App Stores: Reality "Permissions
More informationUsing the Mobile App for Defense Connect Online
Using the Mobile App for Defense Connect Online Conduct and Attend Meetings Virtually Anywhere AUTHOR Aaron W Wolf DCO Evangelist Carahsoft Technology Corp. 703.889.9781 aaron.w.wolf@carahsoft.com Defense
More informationContextion: A Framework for Developing Context-Aware Mobile Applications
Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract
More informationWebEx. Web Conferencing Tool. Fordham IT
WebEx Web Conferencing Tool STUDENT User Guide Fordham IT Contents WebEx Student User Guide Schedule a Meeting Using the WebEx Meeting Site 1 WebEx Scheduling Template 2 Join a Meeting 4 Participate in
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationA Review of Kids Tutor
A Review of Kids Tutor Monali Kumbhare, Ashwini Rajput, Bhavna Daswani Department of CSE, Jhulelal Institute of Technology,Lonara Nagpur Prof. Priyanka Dudhe Assistant Professor, Department of CSE, Jhulelal
More informationESChat Quick Start Guide
ESChat Quick Start Guide for Android Devices January 19, 2016 1 - ESChat Android Quick Start Guide For ESChat version 19.1 or greater 2 - ESChat Android Quick Start Guide Activating ESChat First Time Installation
More informationAutomatized Generating of GUIs for Domain-Specific Languages
Automatized Generating of GUIs for Domain-Specific Languages Michaela Bačíková, Dominik Lakatoš, and Milan Nosáľ Technical University of Košice, Letná 9, 04200 Košice, Slovakia, (michaela.bacikova, dominik.lakatos,
More informationApex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints
Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints Mohammad Nauman Institute of Management Sciences, Pakistan nauman@imsciences.edu.pk Sohail Khan School of
More informationSOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk.
RiskSense Platform RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 27 RiskSense, Inc. Executive Summary The RiskSense Platform is a Software-as-a-Service
More informationOrganizing and Managing Grassroots Enterprise Mashup Environments. Doctorial Thesis, 24 th June, Volker Hoyer
Organizing and Managing Grassroots Enterprise Mashup Environments Doctorial Thesis, 24 th June, 2010 Volker Hoyer Motivation and Research Questions Research Design Results Conclusion Motivation and Research
More informationEIM at the FAA: Translating Semantic Technologies into Direct User Benefit
Global Information Management EIM at the FAA: Translating Semantic Technologies into Direct User Benefit Presented By: Deborah Cowell & John Eberhardt Date: August 27, 2015 What is EIM? Enterprise Information
More informationSAS Model Manager 2.2. Tutorials
SAS Model Manager 2.2 Tutorials The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS Model Manager 2.2: Tutorials. Cary, NC: SAS Institute Inc. SAS Model Manager
More informationBest Practice Guidelines for the Development and Evaluation of Digital Humanities Projects
Best Practice Guidelines for the Development and Evaluation of Digital Humanities Projects 1.0. Project team There should be a clear indication of who is responsible for the publication of the project.
More informationWhat FinAid offices need to know about cyberattacks. Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, EST
What FinAid offices need to know about cyberattacks Presented by: Chris Chumley, COO at CampusLogic Thursday, March 31, 2016 @12pm EST BY 2014, OVER 1 BILLION PERSONAL DATA RECORDS HAD BEEN COMPROMISED
More informationSemantic MediaWiki (SMW) for Scientific Literature Management
Semantic MediaWiki (SMW) for Scientific Literature Management Bahar Sateli, René Witte Semantic Software Lab Department of Computer Science and Software Engineering Concordia University, Montréal SMWCon
More informationHow GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics. Jan Neumann Comcast Labs DC May 10th, 2017
How GPUs Power Comcast's X1 Voice Remote and Smart Video Analytics Jan Neumann Comcast Labs DC May 10th, 2017 Comcast Applied Artificial Intelligence Lab Media & Video Analytics Smart TV Deep Learning
More informationPredictive Analytics using Teradata Aster Scoring SDK
Predictive Analytics using Teradata Aster Scoring SDK Faraz Ahmad Software Engineer, Teradata #TDPARTNERS16 GEORGIA WORLD CONGRESS CENTER At Teradata, we believe. Analytics and data unleash the potential
More informationSMART DEVICES: DO THEY RESPECT YOUR PRIVACY?
SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in
More informationLooking Forward: Challenges in Mobile Security. John Mitchell Stanford University
Looking Forward: Challenges in Mobile Security John Mitchell Stanford University Outline Mobile platform security SessionJuggler Using phone as authentication token SelectiveAuth Protecting resources on
More informationGoogle Hangout Lin Zhong
Tutorial on Google Hangout, Fall, 2012. 1 Page Google Hangout Lin Zhong This tutorial will demonstrate how to make video chat with more than one people at once and how to share screen and video with group
More informationQuickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site:
1 Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site: http://usfca.zoom.us Click on the link Download Zoom on the upper right side of the page and then click on the link for
More informationGetting Started with Lync 2010 for iphone
Getting Started with Lync 2010 for iphone Getting started with Lync 2010 on the iphone» Requirements» Installing Lync» Removing Lync» Signing in to Lync» Signing out of Lync Requirements iphone 3GS, iphone
More informationAttached is a list of the required apps that need to be purchased for the 2015 school year.
POINT COOK PREP-YEAR 9 COLLEGE 18-50 PONSFORD DRIVE PO BOX 6497 POINT COOK 3030 Telephone +613 8348 7100 Fax +613 8348 7199 Email point.cook.p9.co@edumail.vic.gov.au December 17, 2014 Dear Parents and
More informationNPR.ORG - PRIVACY POLICY
Effective Date February 06, 2013 See related: NPR Terms of Use At NPR, we recognize the importance of privacy to visitors of NPR.org, NPR's mobile sites and applications, NPR's interactive voice response
More informationSmart Protection Network. Raimund Genes, CTO
Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000
More informationMedici for Digital Cultural Heritage Libraries. George Tsouloupas, PhD The LinkSCEEM Project
Medici for Digital Cultural Heritage Libraries George Tsouloupas, PhD The LinkSCEEM Project Overview of Digital Libraries A Digital Library: "An informal definition of a digital library is a managed collection
More informationAccession Meeting. Quick Reference Guide. for UCaaS+
Accession Meeting Quick Reference Guide for UCaaS+ Version 1.0 June 30, 2017 Revision History Revision Date Description Initials 1.0 6/30/17 First published version. CS Purpose Use this quick reference
More informationHow to Use Voicethread
How to Use Voicethread October 13, 2016 Julie K. Marsh Coordinator for Distance Education and Instructional Design Need Help? Contact Julie at 804-627-5308 or send an email to julie_marsh@bshsi.org Contents
More informationIphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<<
Iphone Setting Privacy Microphone Viber Set To On In privacy setting i don't find facetime accessing microphone. iphone 4S Again while using viber, if I set it to loud speaker, rare end doesn't hear my
More informationSemantic Web Applications and the Semantic Web in 10 Years. Based on work of Grigoris Antoniou, Frank van Harmelen
Semantic Web Applications and the Semantic Web in 10 Years Based on work of Grigoris Antoniou, Frank van Harmelen Semantic Web Search Engines Charting the web Charting the web Limitations of Swoogle Very
More informationLIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases
LIDER Survey Overview Participant profile (organisation type, industry sector) Relevant use-cases Discovering and extracting information Understanding opinion Content and data (Data Management) Monitoring
More informationWelcome to the Digital connections Setup for the Media Manager using the Axium AX400/AX800 Legacy amplifiers. Audio &Control Systems
Welcome to the Digital Setup for the Media Manager using the Axium AX400/AX800 Legacy amplifiers Ensure that either the AX400/AX800 and the Media Manager are connected to the same Network switch and are
More informationTEXT MINING: THE NEXT DATA FRONTIER
TEXT MINING: THE NEXT DATA FRONTIER An Infrastructural Approach Dr. Petr Knoth CORE (core.ac.uk) Knowledge Media institute, The Open University United Kingdom 2 OpenMinTeD Establish an open and sustainable
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationTOP ETF PICKS PRIVACY NOTICE Last updated October 2018
TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 INTRODUCTION Thank you for choosing to be part of our community at TopETFpicks ( company, we, us, or our ). We are committed to protecting your personal
More informationSASKTEL INTEGRATED BUSINESS COMMUNICATIONS (IBC)
SASKTEL INTEGRATED BUSINESS COMMUNICATIONS (IBC) MOBILE CLIENT USER GUIDE June 2017 Version 1 TABLE OF CONTENTS Download the IBC Mobile Client Application... 3 Presence Status... 3 Contacts Tab... 3 Placing
More informationOn Understanding Permission Usage Contextuality in Android Apps
On Understanding Permission Usage Contextuality in Android Apps Md Zakir Hossen and Mohammad Mannan Concordia Institute of Information Systems Engineering Concordia University, Montreal, Canada {m osssen,mmannan}@ciise.concordia.ca
More informationThe Cloud Meeting Company
The Cloud Meeting Company Cloud Meetings 2015 Cloud Meetings 1980 s 1990 s 2000 s Cloud Video Conferencing Telephone Conferencing Hardware Video Conferencing Online Meetings Group Messaging Simple Online
More informationGetting Started for Moderators Quick Reference Guide
Practice before leading your first session. Become familiar with the session content. Open web pages, applications needed for application sharing and screen captures before session begins. Load multimedia
More informationPlatform Architecture Overview
Platform Architecture Overview Platform overview How-to example Platform components detailed Mediation infrastructure VAS USER container Architecture: overall Backend platform Container Persistence External
More information