2,928 research outputs found

    Analysis of Feature-Completeness in Android Cross-Platform Frameworks

    Get PDF
    In cross-platform mobile development research, we frequently encounter mentions of limitations and constraints potentially imposed by technical tools and development frameworks.This is especially prominent in the context of programmatic device- and platform feature access, including features such as GPS, Internet and device camera access.Although the majority of the literature does not empirically validate these claims, they have reached acceptance in both practitioners' communities and academic research.By downloading a sample of 300,000 Android applications available on the Google Play Store and analysing them, we set forth to find which platform- and device features are the most commonly included in deployed apps.Based on the results, we map the features to their availability in five major cross-platform development frameworks, thus provide an overview of feature completeness and potential shortcomings in these popular frameworks.Our findings indicate that the scrutinised frameworks range from 86.37% to 95.46% feature-completeness and can thus facilitate the development of mobile apps relying on features that are commonly found in our assessed sample of Android apps

    Comprehensive Analysis of Innovative Cross-Platform App Development Frameworks

    Get PDF
    Mobile apps are increasingly realized by using a cross-platform development framework. Using such frameworks, code is written once but the app can be deployed to multiple platforms. Despite progress in research on cross-platform techniques, results (i.e. apps) are not always satisfactory. They are subject to tedious tailoring and the development effort tends to be notable. In these cases, either pure web apps (realized through web browsers) or native apps (realized for each platform separately) are chosen. Recent activities have led to new approaches. In this paper, we have a closer look at three of these, namely React Native, the Ionic Framework, and Fuse. We present a comprehensive analysis of the three approaches. Our work is based on a real-world use case, which allows us to provide generalizable advice. Our findings suggest that there is no clear winner; the frameworks incorporate notable ideas and general progress in the field can be asserted

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Full text link
    In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.Comment: 55 page

    Security Code Smells in Android ICC

    Get PDF
    Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps. To promote secure programming practices, we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their presence. We explain the vulnerabilities and their corresponding smells, and we discuss how they can be eliminated or mitigated during development. We present a lightweight static analysis tool on top of Android Lint that analyzes the code under development and provides just-in-time feedback within the IDE about the presence of such smells in the code. Moreover, with the help of this tool we study the prevalence of security code smells in more than 700 open-source apps, and manually inspect around 15% of the apps to assess the extent to which identifying such smells uncovers ICC security vulnerabilities.Comment: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 201

    Conception and Implementation of a Location-based Augmented Reality Kernel

    Get PDF
    The availability of sophisticated mobile applications on many platforms constitutes a challenging task. In order to cover the most relevant mobile operating systems and make the best use of their underlying features, the native development on the target platform still others the most diverse possibilities. Aside from the most widely spread mobile operating systems - namely Android and iOS - the Windows Phone platform oters a unique design language and many developer tools and technologies for building Windows Store apps. Making use of the capabilities of modern smartphones enables the development and use of desktop-like applications. The built-in sensors, cameras and powerful processing units of such a device other a versatile platform to build against. As a result, many mobile applications and technologies have emerged. However, information on profound insight into the development of such an application is hard to find. In this work, the development of AREA on the Windows Phone 8.1 platform is presented. AREA is a location-based mobile Augmented Reality engine and already available on Android and iOS. By porting the engine to yet another mobile platform, more third-party mobile business applications can integrate AREA and make use of its efficient and modular design. This work also points out the differences in implementation between the Windows Phone version and its counterparts on Android and iOS. Insights into the architecture and some references to the mathematical basis are also provided

    Man-machine partial program analysis for malware detection

    Get PDF
    With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the accompanying proliferation of malware. Existing work addresses the area of consumer malware detection, but cannot detect novel, sophisticated, domain-specific malware that is targeted specifically at one aspect of an organization (eg. ground operations of the US Military). Adversaries can exploit domain knowledge to camoflauge malice within the legitimate behaviors of an app and behind a domain-specific trigger, rendering traditional approaches such as signature-matching, machine learning, and dynamic monitoring ineffective. Manual code inspections are also inadequate, scaling poorly and introducing human error. Yet, there is a dire need to detect this kind of malware before it causes catastrophic loss of life and property. This dissertation presents the Security Toolbox, our novel solution for this challenging new problem posed by DARPA\u27s Automated Program Analysis for Cybersecurity (APAC) program. We employ a human-in-the-loop approach to amplify the natural intelligence of our analysts. Our automation detects interesting program behaviors and exposes them in an analysis Dashboard, allowing the analyst to brainstorm flaw hypotheses and ask new questions, which in turn can be answered by our automated analysis primitives. The Security Toolbox is built on top of Atlas, a novel program analysis platform made by EnSoft. Atlas uses a graph-based mathematical abstraction of software to produce a unified property multigraph, exposes a powerful API for writing analyzers using graph traversals, and provides both automated and interactive capabilities to facilitate program comprehension. The Security Toolbox is also powered by FlowMiner, a novel solution to mine fine-grained, compact data flow summaries of Java libraries. FlowMiner allows the Security Toolbox to complete a scalable and accurate partial program analysis of an application without including all of the libraries that it uses (eg. Android). This dissertation presents the Security Toolbox, Atlas, and FlowMiner. We provide empirical evidence of the effectiveness of the Security Toolbox for detecting novel, sophisticated, domain-specific Android malware, demonstrating that our approach outperforms other cutting-edge research tools and state-of-the-art commercial programs in both time and accuracy metrics. We also evaluate the effectiveness of Atlas as a program analysis platform and FlowMiner as a library summary tool

    Comparative Analysis Between Native and Hybrid Mobile Applications

    Get PDF
    With the growth of technology in the mobile area, the app market has been bringing solutions to many problems and making life easier for many people, whether in the business, technology, administrative and many others. It is necessary to understand that to build an app, there are many technologies for different purposes, and developers need to know which one is best applied in every situation. Therefore, the objective of this research is to bring an analysis about the native and hybrid development, showing its main features and information regarding the usability and functionality of two existing applications, which were built within the standards of each tool, based on two features of ISO / IEC 25010: 2011 regarding Software Product Quality. An exploratory research was conducted to bring comparative data regarding applications, and based on the results obtained, it was observed that it is possible to develop similar applications in interface, quality and functionality, even if they are built with different technologies. As a result, native technology is often used to build more robust functionality-based applications that follow the interface standard of each platform, and hybrids are a lower-cost alternative, as well as fact that its source code is fully reusable for use on other platforms

    An Approach to Secure Mobile Enterprise Architectures

    Full text link
    Due to increased security awareness of enterprises for mobile applications operating with sensitive or personal data as well as extended regulations form legislative (the principle of proportionality) various approaches, how to implement (extended) two-factor authentication, multi-factor authentication or virtual private network within enterprise mobile environments to ensure delivery of secure applications, have been developed. Within mobile applications it will not be sufficient to rely on security measures of the individual components or interested parties, an overall concept of a security solution has to be established which requires the interaction of several technologies, standards and system components. These include the physical fuses on the device itself as well as on the network layer (such as integrated security components), security measures (such as employee agreements, contract clauses), insurance coverage, but also software technical protection at the application level (e.g. password protection, encryption, secure container). The purpose of this paper is to summarize the challenges and practical successes, providing best practices to fulfill appropriate risk coverage of mobile applications. I present a use case, in order to proof the concept in actual work settings, and to demonstrate the adaptability of the approach.Comment: 8 pages, 9 figures, tutorial pape
    corecore