947 research outputs found

    Enforcing Application Security on Android Mobile Devices

    Get PDF
    Security in new generation mobile devices is currently a problem of capital importance. Smartphones and tablets have become extremely popular in the last years, especially in developed country where smartphones and tablets account for 95% of active mobile devices. Due to their popularity, these devices have fast drawn the attention of malicious developers. Attackers have started to implement and distribute applications able to harm user’s privacy, user’s money and even device and data integrity. Malicious developers have cleverly exploited the simplicity of app distribution, the sensitivity of information and operation accessible through mobile devices, together with the user limited attention to security issues. This thesis presents the study, design and implementation of a multi-component security framework for the popular Android operative system. The aim of this thesis is to provide a lightweight and user friendly security tool, extensible and modular, able to tackle current and future security threats on Android devices. The framework exploits white list-based methodologies to detect at runtime malicious behaviors of application, without being prone to the problem of zero-day-attacks (i.e. new threats not yet discovered by the community). The white-list approach is combined with a black-list security enforcement, to reduce the likelihood of false alarms and to tackle known misbehaviors before they effectively take place. Moreover the framework also combines static and dynamic analysis. It exploits probabilistic contract theory and app metadata to detect dangerous applications before they are installed (static analysis). Furthermore, detects and stop malicious kernel level events and API calls issued by applications at runtime (dynamic analysis), to avoid harm to user and her device. The framework is configurable and can be both totally transparent to the user, or have a stronger interaction when the user is more interested in a security awareness of her device. The presented security framework has been extensively tested against a testbed of more than 12000 applications including two large Android malware databases. Detection rate (95%) and false positive rate (1 per day) prove the effectiveness of the presented framework. Furthermore, a study of usability which includes energy evaluation and more than 200 user feedback is presented. These results show both the limited overhead (4% battery, 1.4% performance) imposed by the framework and the good user acceptance

    Modeling the user state for context-aware spoken interaction in ambient assisted living

    Get PDF
    Ambient Assisted Living (AAL) systems must provide adapted services easily accessible by a wide variety of users. This can only be possible if the communication between the user and the system is carried out through an interface that is simple, rapid, effective, and robust. Natural language interfaces such as dialog systems fulfill these requisites, as they are based on a spoken conversation that resembles human communication. In this paper, we enhance systems interacting in AAL domains by means of incorporating context-aware conversational agents that consider the external context of the interaction and predict the user's state. The user's state is built on the basis of their emotional state and intention, and it is recognized by means of a module conceived as an intermediate phase between natural language understanding and dialog management in the architecture of the conversational agent. This prediction, carried out for each user turn in the dialog, makes it possible to adapt the system dynamically to the user's needs. We have evaluated our proposal developing a context-aware system adapted to patients suffering from chronic pulmonary diseases, and provide a detailed discussion of the positive influence of our proposal in the success of the interaction, the information and services provided, as well as the perceived quality.This work was supported in part by Projects MINECO TEC2012-37832-C02-01, CICYT TEC2011-28626-C02- 02, CAM CONTEXTS (S2009/TIC-1485

    Digital Media and Textuality: From Creation to Archiving

    Get PDF
    Due to computers' ability to combine different semiotic modes, texts are no longer exclusively comprised of static images and mute words. How have digital media changed the way we write and read? What methods of textual and data analysis have emerged? How do we rescue digital artifacts from obsolescence? And how can digital media be used or taught inside classrooms? These and other questions are addressed in this volume that assembles contributions by artists, writers, scholars and editors. They offer a multiperspectival view on the way digital media have changed our notion of textuality

    Digital Media and Textuality

    Get PDF
    Due to computers' ability to combine different semiotic modes, texts are no longer exclusively comprised of static images and mute words. How have digital media changed the way we write and read? What methods of textual and data analysis have emerged? How do we rescue digital artifacts from obsolescence? And how can digital media be used or taught inside classrooms? These and other questions are addressed in this volume that assembles contributions by artists, writers, scholars and editors such as Dene Grigar, Sandy Baldwin, Carlos Reis, and Frieder Nake. They offer a multiperspectival view on the way digital media have changed our notion of textuality

    Three Studies Of Service-Learning As An Approach To Movement Integration In Elementary Classrooms

    Get PDF
    This dissertation consists of three studies that examine service-learning (SL) as an approach to incorporating movement integration (MI) in elementary classrooms as part of a comprehensive school physical activity program (CSPAP). All three studies attempt to advance the knowledge base about using partnership approaches to supporting schoolbased physical activity promotion. The purpose of study one was to examine the perceptions of preservice classroom teachers (PCTs), classroom teachers (CTs), and course instructors who participated in a constructivist-guided university course with a focus on MI and a SL component. Focus groups with 172 PCTs and individual interviews with 7 CTs and 4 course instructors were thematically analyzed using constant comparison techniques to identify perceived successes and challenges of the course. Findings centered on three themes, including realworld context (gaining entry but losing access, and placements and scheduling), learning embedded in a social context (peer support, reciprocal learning, real world outcomes, and social interactions), and scaffolding (teacher as facilitator and support structure). The purpose of study 2 was to examine the experiences of PCTs, CTs, course instructors, and elementary students who were involved in a distance delivery version of the course described in Study 1. The distance delivery version of the course was designed using constructivist-guided SL and in accordance with recommended best practices for distance education. Using a qualitative single case study design, interviews, observations, and artifacts (e.g., PCTs’ reflections and academic work) were thematically analyzed. Findings indicated three themes, including student-centered approach (teacher as facilitator), benefit/importance of PA (future implementer, enjoyment of the real world, and I don’t like to sit), and connect and reflect (sharing new ideas and communication). The purpose of study 3 was to conduct a systematic review to identify facilitators and barriers to (a) using MI and (b) using university-based SL in elementary school classrooms. Four online databases (Educational Resources Information Center, Google Scholar, PsycINFO, and PubMed) served as data sources for the study. Following the PRISMA guidelines, relevant published research on MI and SL, respectively, was identified using two separate searches and screened for inclusion in qualitative syntheses. Content analyses of the included articles (31 for MI and 5 for SL) were used to identify 26 facilitators and 15 barriers associated with MI and 22 facilitators and 24 barriers associated with SL. Data analysis was guided by Emmons’ (2000) social ecological model and involved categorizing facilitators and barriers for MI and SL based on commonalities and consistencies. The categories for MI included institutional factors (e.g., resources, administrative support, and monitoring) and intrapersonal factors (e.g., teacher confidence, and ease of implementation). The categories for SL included intrapersonal factors (e.g., shared decision making, and previous experience) and institutional factors (e.g., lack of training, management issues, and implementation challenges). Overall, the findings from this dissertation provide evidence to support efforts aligned with using university SL to aid CTs in using MI

    Digital Media and Textuality

    Get PDF
    Due to computers' ability to combine different semiotic modes, texts are no longer exclusively comprised of static images and mute words. How have digital media changed the way we write and read? What methods of textual and data analysis have emerged? How do we rescue digital artifacts from obsolescence? And how can digital media be used or taught inside classrooms? These and other questions are addressed in this volume that assembles contributions by artists, writers, scholars and editors such as Dene Grigar, Sandy Baldwin, Carlos Reis, and Frieder Nake. They offer a multiperspectival view on the way digital media have changed our notion of textuality

    Study on Doping Prevention: A map of Legal, Regulatory and Prevention Practice Provisions in EU 28

    Get PDF
    Historically, anti-doping efforts have focused on the detection and deterrence of doping in elite and competitive sport. There is, however, a growing concern that doping is occurring outside the organised sporting system; giving rise to the belief that the misuse of doping agents in recreational sport has become a societal problem and a public health issue that must be addressed. The EU Commission awarded a contract (EAC/2013/0617) to a Consortium to undertake this Study with the aim of developing the evidence-base for policies designed to combat doping in recreational sport. Fourteen internationally recognised experts shaped the Study which comprised (i) the collection of primary data through a structured survey, and (ii) secondary data through literature searches and website analysis. All 28 Member States participated in the information-gathering process. Specifically, this involved a systematic study of the ethical considerations, legal position, prevention research landscape, and current practise in relation to the prevention of doping in recreational sport. The Study provides a comprehensive overview of current practice and legislation as it applies to the prevention of doping and promotes and supports the sharing of best practices in the EU regarding the fight against doping in recreational sport. It concludes with seven recommendations for future action that focus on the need for a coordinated response in relation to the problems arising from doping in recreational sport

    Policy Driven Software Monitoring

    Get PDF
    Software monitoring and logging is one of the most important tools a software engineer has when faced with the challenge of auditing or analysing a software system. However, the difficulty in effectively monitoring a system, managing its logs and cross referencing them with source code makes software re-engineering a rigorous and complex task. This thesis aims to address this issue by providing a framework that enables pattern matching between a software log and an event pattern expression that is based on a monitoring policy. The framework consists of parsers and annotators that facilitates transformation of a monitoring policy into a Petri Net as well as source code annotation for gathering data through logged events. It further expands upon this work by proposing an adaptive logging framework that will greatly improve the quality of log management by autonomically adjusting the amount of information logged based on the application’s operational environment. Finally, a prototype system of the policy driven monitoring framework is implemented and tested with applications of different scales as a proof of concept for the proposed framework

    ALT-C 2010 - Conference Proceedings

    Get PDF

    CGAMES'2009

    Get PDF
    corecore