International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and
the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,
the image undergoes image classification process by using Support Vector Machine. The proposed method
performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
This Presentation (Android) is prepared by me for Education Purpose. And be careful for Hyperlinks. There are so many Hyperlinks. Just click on them.
Thank You
Mr. SOM
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and
the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,
the image undergoes image classification process by using Support Vector Machine. The proposed method
performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
This Presentation (Android) is prepared by me for Education Purpose. And be careful for Hyperlinks. There are so many Hyperlinks. Just click on them.
Thank You
Mr. SOM
Vibrant Technologies is headquarted in Mumbai,India.We are the best Android training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Android classes in Mumbai according to our students and corporators
contact us on : vibranttechnologies.co.in
Evolution of Android Operating System and it’s Versionsijtsrd
Android is a software stack for mobile devices that includes an operating system, middleware and key applications. It can be considered as a software platform as well as an operating system for mobile devices based on the Linux operating system and currently developed by Google. It is designed primarily for touch screens mobile devices such as smartphones and tablet computers. One of the most widely used mobile OS these days is android. It is free and open source software its source code is known as Android Open Source Project AOSP , which is primarily licensed under the Apache License. This Paper Contains android architecture consists of key applications, Application framework, Native libraries, Android runtime, DVM, Linux Kernal., Many versions of Android Operating System are KitKat, JellyBean, Honeycomb, Froyo etc… Advantages and Disadvantages of Android and also the conclusion. Aishwarya Gujar | Prof. Pratibha Adkar "Evolution of Android Operating System and it’s Versions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42519.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/42519/evolution-of-android-operating-system-and-it’s-versions/aishwarya-gujar
This presentation gives detailed overview of Android, Android Architecture, Software Stack, Platform, Database Support, Licensing, File System, Network Connectivity, Security and Permissions, IDE and Tools, Other IDEs Overview, Development Evaluation, Singing your application, Versioning your application, Preparing to publish your application, Publish your App on Android Market. This presentation also includes links to sample exampled.
Note: Few slides from this presentation are taken from internet or slideshare.com as it is or modified little bit. I have no intention of saying someone’s else work as mine. I prepared this presentation to just educate co-workers about android. So I want the best material from internet and slideshare.com.
Vibrant Technologies is headquarted in Mumbai,India.We are the best Android training provider in Navi Mumbai who provides Live Projects to students.We provide Corporate Training also.We are Best Android classes in Mumbai according to our students and corporators
contact us on : vibranttechnologies.co.in
Evolution of Android Operating System and it’s Versionsijtsrd
Android is a software stack for mobile devices that includes an operating system, middleware and key applications. It can be considered as a software platform as well as an operating system for mobile devices based on the Linux operating system and currently developed by Google. It is designed primarily for touch screens mobile devices such as smartphones and tablet computers. One of the most widely used mobile OS these days is android. It is free and open source software its source code is known as Android Open Source Project AOSP , which is primarily licensed under the Apache License. This Paper Contains android architecture consists of key applications, Application framework, Native libraries, Android runtime, DVM, Linux Kernal., Many versions of Android Operating System are KitKat, JellyBean, Honeycomb, Froyo etc… Advantages and Disadvantages of Android and also the conclusion. Aishwarya Gujar | Prof. Pratibha Adkar "Evolution of Android Operating System and it’s Versions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42519.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/42519/evolution-of-android-operating-system-and-it’s-versions/aishwarya-gujar
This presentation gives detailed overview of Android, Android Architecture, Software Stack, Platform, Database Support, Licensing, File System, Network Connectivity, Security and Permissions, IDE and Tools, Other IDEs Overview, Development Evaluation, Singing your application, Versioning your application, Preparing to publish your application, Publish your App on Android Market. This presentation also includes links to sample exampled.
Note: Few slides from this presentation are taken from internet or slideshare.com as it is or modified little bit. I have no intention of saying someone’s else work as mine. I prepared this presentation to just educate co-workers about android. So I want the best material from internet and slideshare.com.
Outstanding Improvement Award Outstanding Improvement Awardpravinmali2191
The chemicals industry (industrial chemicals, pharmaceuticals, pesticides, biocides, food and feed additives and cosmetics) is one of the largest industrial sectors in the world and one which poses many challenges for government regulators; inefficient regulation would have costly implications for the environment, human health, government budgets and the continued growth of this important global industry. Not only can different regulatory approaches and requirements in each OECD country create significant costs for the chemicals industry and for governments, they can also create barriers to trade.
If national approaches to chemical regulation are harmonised, industry is not faced with a plethora of conflicting or duplicative requirements, governments are provided with a common basis for working with each other, and non-tariff barriers to trade are reduced. The principal tools for harmonisation are a set of OECD Council Decisions which make up the OECD Mutual Acceptance of Data (MAD) system, including its OECD Guidelines for the Testing of Chemicals and OECD Principles of Good Laboratory Practice (GLP).
The chemicals industry (industrial chemicals, pharmaceuticals, pesticides, biocides, food and feed additives and cosmetics) is one of the largest industrial sectors in the world and one which poses many challenges for government regulators; inefficient regulation would have costly implications for the environment, human health, government budgets and the continued growth of this important global industry. Not only can different regulatory approaches and requirements in each OECD country create significant costs for the chemicals industry and for governments, they can also create barriers to trade.
If national approaches to chemical regulation are harmonised, industry is not faced with a plethora of conflicting or duplicative requirements, governments are provided with a common basis for working with each other, and non-tariff barriers to trade are reduced. The principal tools for harmonisation are a set of OECD Council Decisions which make up the OECD Mutual Acceptance of Data (MAD) system, including its OECD Guidelines for the Testing of Chemicals and OECD Principles of Good Laboratory Practice (GLP).
The chemicals industry (industrial chemicals, pharmaceuticals, pesticides, biocides, food and feed additives and cosmetics) is one of the largest industrial sectors in the world and one which poses many challenges for government regulators; inefficient regulation would have costly implications for the environment, human health, government budgets and the continued growth of this important global industry. Not only can different regulatory approaches and requirements in each OECD country create significant costs for the chemicals industry and for governments, they can also create barriers to trade.
If national approaches to chemical regulation are harmonised, industry is not faced with a plethora of conflicting or duplicative requirements
ABSTRACT
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
Cc4201519521
1. Rajinder Singh Int. Journal of Engineering Research and Applications
www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.519-521
RESEARCH ARTICLE
OPEN ACCESS
An Overview of Android Operating System and Its Security
Features
Rajinder Singh
Department of Computer Science and Applications DCSA Panjab University SSGRC Hoshiarpur
ABSTRACT
Android operating system is one of the most widely used operating system these days. Android Operating
System is mainly divided into four main layers: the kernel, libraries, application framework and applications. Its
kernel is based on Linux. Linux kernel is used to manage core system services such as virtual memory,
networking, drivers, and power management. In these paper different features of architecture of Android OS as
well security features of Android OS are discussed.
Keywords – Dalvik VM, Linux, Sandbox
I. INTRODUCTION
Android operating system is one of the most widely
used mobile Operating System these days [1].
Android mobile operating system is based on the
Linux kernel and is developed by Google. Android
operating system is primarily designed for
smartphones and tablets. Since Android is an open
source it has become the fastest growing mobile
operating system. Due to its open nature it has
become favorite for many consumers and developers.
Moreover software developers can easily modify and
add enhanced feature in it to meet the latest
requirements of the mobile technology [2]. Android
users download more than 1.5 billion applications
and games from Google Play each month. Due to Its
Powerful development framework users as well
software developers are able to create their own
applications for wide range of devices [3]. Some of
the key features of Android operating system are:
Application Frame work, Dalvik virtual machine,
Integrated browser, Optimized Graphics, SQLite,
Media Support, GSM Technology, Bluetooth, Edge,
3G, Wi-Fi, Camera and GPS etc [1]. To help the
developers for better software development Android
provides Android Software development kit (SDK).
It provides Java programming Language for
application development [1]. The Android software
development kit includes a debugger, libraries, a
handset emulator based on QEMU (Quick Emulator),
documentation, sample code, and tutorials [4].
II. ARCHITECTURE OF ANDROID
OPERATING SYSTEM
Android operating system is a stack of software
components. Main components of Android Operating
system Architecture or Software Stack are Linux
www.ijera.com
kernel, native libraries, Android
Application Framework and Applications.
2.1
Runtime,
Linux Kernel
Linux Kernel (Linux 2.6) is at the bottom layer of the
software stack. Whole Android Operating System is
built on this layer with some changes made by the
Google [5]. Like main Operating System it provides
the following functionalities: Process management,
Memory Management, device management (ex.
camera, keypad, display etc). Android operating
system interacts with the hardware of the device with
this layer [6]. This layer also contains many
important hardware device drivers. Linux kernel is
also responsible for managing virtual memory,
networking, drivers, and power management [7].
2.2
Native Libraries Layer
On the top of the Linux Kernel layer is Android's
native libraries. This layer enables the device to
handle different types of data. Data is specific to
hardware. All these libraries are written in c or c++
language. These libraries are called through java
interface. Some important native libraries are:
Surface Manager: it is used to manage display of
device. Surface Manager used for composing
windows on the screen.
SQLite: SQLite is the database used in android for
data storage. It is relational database and available to
all applications.
WebKit: It is the browser engine used to display
HTML content.
Media framework: Media framework provides
playbacks and recording of various audio, video and
picture formats.( for example MP3, AAC, AMR,
JPG, MPEG4, H.264, and PNG).
519 | P a g e
2. Rajinder Singh Int. Journal of Engineering Research and Applications
www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.519-521
Free Type: Bitmap and Font Rendering
OpenGL | ES: Used to render 2D or 3D graphics
content to the screen
libc: It contains System related C libraries [5].
2.3
Android Runtime
Android Runtime consists of Dalvik Virtual machine
and Core Java libraries. It is located on the same level
as the library layer [5]. Dalvik Virtual Machine is a
type of Java Virtual Machine used for running
applications on Android device. The Dalvik VM
enables every Android application to run in its own
process, with its own instance of the Dalvik virtual
machine. The Dalvik VM allows multiple instance of
Virtual machine to be created simultaneously
providing security, isolation, memory management
and threading support [8]. Unlike Java VM which is
process-based, Dalvik Virtual Machine is registerbase. Dalvik Virtual Machine run .dex files which are
created from .class file by dx tool. dx tool is included
in Android SDK. DVM is optimized for low
processing power and low memory environments.
DVM is developed by Dan Bornstein from Google
[9].
2.4
Application Framework
The Application Framework layer provides many
higher-level services or major APIs to applications in
the form of Java classes. Application developers are
allowed to make use of these services in their
applications [6]. These are the blocks with which
developer's applications directly interact. Important
blocks of Application framework are:
Activity Manager: It manages the life cycle of
applications.
Content Providers: It is used to manage the data
sharing between applications, manages how to access
data from other applications.
Telephony Manager: it manages all voice call related
functionalities.
Location Manager: It is used for Location
management, using GPS or cell tower.
Resource Manager: Manage the various types of
resources used in Application [8].
2.5
Application Layer
The Applications Layer is the top layer in the
Android architecture. Some applications come preinstalled with every device, such as: SMS client app,
Dialer, Web browser and Contact manager. A
developer can write his own application and can
replace it with the existing application [8].
www.ijera.com
III. DIFFERENT SECURITY FEATURES OF
ANDROID OS
Android Operating system should ensure the security
of users, user's data, applications, the device, and the
network. To achieve the security of these components
Android provides these key security features [10]:1)
Security at the Operating System level through the
Linux kernel. 2) Application sandbox for all
applications 3) Secure interprocess communication.
4) Application signing. 5) Application-defined and
user-granted permissions.
3.1
Linux Kernel
Android operating system is based on Linux kernel.
Due to its open source nature it is researched,
attacked and fixed by many research developers. So
Linux has become stable and secure kernel.
Linux kernel provides Android with several key
security features including:
a) A user-based permissions model
In the Linux file system each file and directories has
three user based permissions. owner, group, other
users. owner - The Owner permissions apply only the
owner of the file or directory. group - The group
permissions apply only to the group that has been
assigned to the file or directory. other users - The
other Users permissions apply to all other users on
the system. Each file or directory has three basic
permission types: read - The read permission means
user's ability to read the contents of the file. write write permissions mean's user's ability to write or edit
a file or directory. execute - The execute permission
means user's ability to execute a file or view the
contents of a directory [11]. This permission model
ensures that proper security is maintained while
accessing android files.
b) Process isolation:
The Android operating system assigns a unique user
ID (UID) to each Android application and runs it as a
separate process.
c) Extensible mechanism for secure IPC.
d) The ability to remove unnecessary and insecure
parts of the kernel [10].
3.2 The Application Sandbox
A sandbox is a security mechanism for separating
running programs and limiting the resources of the
device to application. It is often used to execute
untested code or programs from untrusted users and
untrusted websites. By using sandboxing technique
limited access to device’s resources is given.
Therefore security of the system is increased.
Sandboxing technology is frequently used to test
unverified programs which may contain a virus or
other malware code, without allowing the software or
520 | P a g e
3. Rajinder Singh Int. Journal of Engineering Research and Applications
www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.519-521
code to harm the host device. With the help of
sandbox untrusted program access only those
resources of the device for which permission is
granted. Permission is denied if it tries to access other
resources of the device [12].
3.3 Secure inter-process communication
Some of the applications still use traditional Linux
techniques such as network sockets, file system and
shared files for inter-process communication. But
android operating system also provides new
mechanism for IPC such as Binder, Services, Intents
and ContentProviders. All these mechanism allows
developers to verify the identity of application and
also used to set the security policies [13].
IV. CONCLUSION
From above discussion it is clear that
Android Operating System follows a variety of
security mechanism. When a developer install an
application a new user profile with that application is
created. Each application run with its own instance of
Dalvik VM. So applications cannot access each
other’s data. If applications want to access shared
data or resources then they require permissions. All
Android applications are signed so users know that
the application is authentic. The signing mechanism
allows developer to control which applications can
grant access to other application on the system.
REFERENCES
[1]
3.4 Application signing
[2]
In order to install and run applications on Android
OS they must be digitally signed.
With this
mechanism Android OS identifying the author of an
application. This feature also used to establishing
trust relationship between applications.
If an application is no signed properly then it cannot
be installed on the emulator also. Some standard tools
such as Keytool and Jarsigner are used to generate
keys and sign application .apk files [15].
[3]
3.5 Application-defined
permissions
[8]
and
user-granted
[4]
[5]
[6]
[7]
[9]
Permissions are an Android security mechanism to
allow or restrict application access. By default,
Android applications have no permissions granted,
making them safe by not allowing them to gain
access to protected APIs [14]. Some of the protected
APIs include: Camera functions, Location data (GPS)
,Bluetooth
functions,
Telephony
functions,
SMS/MMS functions and Network or data
connections. These resources are accessed only
through the operating system [10].
[10]
[11]
[12]
[13]
[14]
[15]
www.ijera.com
http://www.engineersgarage.com/articles/wh
at-is-android-introduction.
http://en.wikipedia.org/wiki/Android_(opera
ting_system)
http://developer.android.com/about/index.ht
ml
http://en.wikipedia.org/wiki/Android_softwa
re_development
http://www.tkhts.com/android/android-archit
ecture.jsp
http://www.tutorialspoint.com/android/andro
id_architecture.htm
http://www.compiletimeerror.com/2012/12/
blog-post.html#.UuYiIGC6bIU
http://www.android-appmarket.com/ android
-architecture.html
http://ptcoresec.eu/2013/05/02/part-1-getting
-to-know-android/
http://source.android.com/devices/tech/secur
ity/
http://www.linux.com/learn/tutorials/309527
-understanding-linux-file-permissions
http://en.wikipedia.org/wiki/Sandbox_(comp
uter_security)
http://developer.android.com/training/article
s/security-tips.html
http://www.ibm.com/developerworks/library
/x-androidsecurity/
http://developer.android.com/tools/publishin
g/app-signing.html
521 | P a g e