266 research outputs found

    IMPLEMENTATION OF TACTICAL OPEN SOURCE 5G MOBILE NETWORKS

    Get PDF
    The implementation of fifth-generation (5G) communications technology is a global effort, with China leading the way. The Department of Defense has initiated efforts on 5G implementation from smart warehouses to virtual combat training; however, focus on the tactical communications level remains minimal. This thesis examines the feasibility of using OpenAirInterface Software Alliance (OSA) software to build a private mobile ad hoc 5G network for various military applications. First, we created a Fourth Generation/Long Term Evolution network utilizing commercial off-the-shelf equipment and software to operate the radio access network (RAN), software-defined radio, and an evolved packet core (EPC). Then we connected the EPC to an 802.11 network for internet access. We successfully configured a subscriber identification module and smartphone and attached it to the network for data services. Although the OSA software is robust and customizable, it is difficult to make changes, is restrictive in which user equipment (UE) can connect to the network, and does not reliably allow the UE to connect. The potential of OSA software for military applications is apparent but does not appear ready for field implementation. Going forward, we recommend researchers use this work to implement new software versions and test scalability to reassess the feasibility of OSA software.NCWDGLieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    Automatic deployment of climate data services with Kubernetes

    Get PDF
    RESUMEN: En este trabajo se describe un caso de uso de herramientas para la automatización del despliegue de servicios en un entorno DevOps1. En concreto se hablará de la utilización de Kubernetes como herramienta de orquestación de contenedores de software (i.e. Docker) para el despliegue de servicios y aplicaciones de software de acceso a datos climáticos. Este trabajo ha sido llevado a cabo como parte de una estancia en el Centre for Environmental Data Analysis (CEDA), del Reino Unido. Las tareas han sido realizadas dentro de un proyecto para el Copernicus Climate Change Service (C3S), que forma parte del Programa Copernicus, dirigido conjuntamente por la Agencia Espacial Europea (ESA) y la Agencia Europea de Medio Ambiente (EEA), en representación de la Unión Europea. El servicio C3S promueve el acceso, libre y abierto, a datos medioambientales para que puedan ser usados por la comunidad científica, proveedores y desarrolladores de servicios. El objetivo de este trabajo es describir un modelo que facilita el acceso a los datos, y probar la eficiencia de Kubernetes como herramienta para la automatización del despliegue y el autoescalado horizontal de servicios, que se ejecutan en el back-end.ABSTRACT: This document describes a use case of tools for the automation of service deployment in a DevOps2 environment. In particular, the use of Kubernetes will be discussed as a software container orchestration tool for the deployment of climate data access services and software applications. The tasks in this document have been carried out as part of an industrial placement in the Centre for Environmental Data Analysis (CEDA), in United Kingdom. The jobs accomplished here belong to a project of the Copernicus Climate Change Service (C3S), which is part of the Copernicus Program, leaded by the European Space Agency (ESA) and the European Environment Agency (EEA) on behalf of the European Union. C3S supports access, free and open, to environmental data to be used by the scientific community, providers and service suppliers. The goal of this document is describing a model that provides access to data and proving the efficiency of Kubernetes as a tool for the automatic deployment and the horizontal autoscaling of services running in the back-end.Grado en Ingeniería de Tecnologías de Telecomunicació

    Android Application Security Scanning Process

    Get PDF
    This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and their devices from being victims to different malware attacks. The scanning process is comprehensive, explaining the main phases and how they are conducted including (a) the download of the apps themselves; (b) Android application package (APK) reverse engineering; (c) app feature extraction, considering both static and dynamic analysis; (d) dataset creation and/or utilization; and (e) data analysis and data mining that result in producing detection systems, classification systems, and ranking systems. Furthermore, this chapter highlights the app features, evaluation metrics, mechanisms and tools, and datasets that are frequently used during the app’s security scanning process

    Execution Offloading 기술을 사용한 모바일 기기를 위한 클라우드 보안 솔루션

    Get PDF
    학위논문 (석사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2015. 8. 백윤흥.So far, security mechanisms for mobile devices have had difficulties to protect from malicious threats due to the limited resources of mobile devices. With the prevalence of cloud computing, one of promising solutions to overcome the difficulties is to exploit cloud environments, where a remote virtual machine performs the resource-consuming security analysis instead of a mobile device. However, existing cloud-based solutions are still insufficient because of the code coverage problem and security level degradation. Therefore, this thesis proposes a static and dynamic analysis based security solution called SORCloud. For dynamic analysis, it offloads a process of a suspicious application to a remote virtual machine for dynamic security analysis, by which SORCloud resolves two problems mentioned above. Through comprehensive experiments, we show how efficiently the proposed scheme works and detects malicious behaviorContents I. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 II. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 III. RelatedWork . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1 Androgaurd . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2 Andriod-apktool . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Dex2Jar . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.4 Dexter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.5 APKInspector . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.6 API monitor . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.7 offloading . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 IV. SorCloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . 16 4.2 System Modules . . . . . . . . . . . . . . . . . . . . . . . . 17 4.3 Execution offloading . . . . . . . . . . . . . . . . . . . . . 18 4.3.1 Code Instrumentation . . . . . . . . . . . . . . . . . 18 4.3.2 Thread Migration . . . . . . . . . . . . . . . . . . . 21 4.4 Security Modules . . . . . . . . . . . . . . . . . . . . . . . 23 4.5 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . 25 4.6 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.6.1 Experimental setup . . . . . . . . . . . . . . . . . . 26 ii 4.6.2 Experimental results . . . . . . . . . . . . . . . . . 27 4.7 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . 34 4.8 FUTURE WORK . . . . . . . . . . . . . . . . . . . . . . . 35 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 초록 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41Maste

    Benchmarking de Herramientas Forenses para Móviles

    Get PDF
    Actualmente, y cada día con más importancia, los dispositivos móviles (Smartphones y tablets) se han convertido en una herramienta indispensable en las labores diarias tanto a nivel corporativo y personal. Estos dispositivos no solo son capaces de almacenar información referente a la agenda de contactos o reproductor de música y vídeo, sino que son capaces de almacenar una gran cantidad de información que puede resultar ser muy útil en un caso de la informática forense. Nos enfrentamos a grades desafíos como es BYOD ( Bring of your device) está política está haciendo grandes cambios en el mundo de los negocios ya que alrededor de un 90% de los empleados (en los países desarrollados) utilizan sus equipos de algún modo para acceder a la información de la empresa. En la mayoría de los casos las empresas no pueden cambiar esta tendencia. Algunos creen que BYOD ayuda a los empleados a ser más productivos otros creen que eleva la moral de los empleados ya que se permite la flexibilidad dentro de la empresa, pero otro punto de vista es que esto vuelve frágil la Seguridad de la Información y puede vulnerarse la seguridad a través de estos dispositivos. En este proyecto se ha realizado la evaluación de dos suites que poseen diferentes herramientas forenses para dispositivos móviles y una herramienta especializada en extracción de datos, para ello se presenta una breve descripción de la arquitectura de los móviles Android, una breve descripción de las herramientas evaluadas, metodología utilizada para la realización del benchmarking, exponiendo los criterios utilizados para posteriormente presentar el análisis de los resultados obtenidos y algunas recomendaciones que son de mucha importancia para este estudi

    LEVERAGING OPENAIRINTERFACE AND SOFTWARE DEFINED RADIO TO ESTABLISH A LOW-COST 5G NON-STANDALONE ARCHITECTURE

    Get PDF
    Includes Supplementary MaterialCommercial cellular service providers are at the forefront of the paradigm shift from 4G Long Term Evolution (LTE) to 5G New Radio (NR). The increase in throughput, provisioning of ultra-low latency, and greater reliability of 5G enable potential uses that no other wireless communication could support. The Department of Defense (DOD) is interested in 5G NR technologies, but the implementation of the architecture can be lengthy and costly. This capstone configured a 4G LTE network and a 5G non-standalone network using OpenAirInterface and software defined radios (SDRs). Universal Subscriber Identity Module (USIM) cards were configured and introduced to user equipment and attached to the 4G LTE network. A gNodeB (gNB) was added to the 4G LTE network to establish the 5G non-standalone (NSA) network architecture (3GPP Option 3). The testbed developed in this research was able to connect the core to a commercial internet service provider and browse the internet using third-party applications. Our analysis educates future researchers on the challenges and lessons learned when implementing the OpenAirInterface 4G LTE and 5G NSA networks. This work also provides a better understanding of 4G LTE and 5G NSA OpenAirInterface software usability, flexibility, and scalability for potential use cases for the DOD.Chief Petty Officer, United States NavyApproved for public release. Distribution is unlimited

    Hooking Java methods and native functions to enhance Android applications security

    Get PDF
    Mobile devices are becoming the main end-user platform to access the Internet. Therefore, hackers’ interest for fraudulent mobile applications is now higher than ever. Most of the times, static analysis is not enough to detect the application hidden malicious code. For this reason, we design and implement a security library for Android applications exploiting the hooking of Java and native functions to enable runtime analysis. The library verifies if the application shows compliance to some of the most important security protocols and it tries to detect unwanted activities. Testing of the library shows that it successfully intercepts the targeted functions, thus allowing to block the application malicious behaviour. We also assess the feasibility of an automatic tool that uses reverse engineering to decompile the application, inject our library and recompile the security-enhanced application. I dispositivi mobile rappresentano ormai per gli utenti finali la principale piattaforma di accesso alla rete. Di conseguenza, l’interesse degli hacker a sviluppare applicazioni mobile fraudolente è più forte che mai. Il più delle volte, l’analisi statica non è sufficiente a rilevare tracce di codice ostile. Per questo motivo, progettiamo e implementiamo una libreria di sicurezza per applicazioni Android che sfrutta l’hooking di funzioni Java e native per effettuare un’analisi dinamica del codice. La libreria verifica che l’applicazione sia conforme ad alcuni dei principali protocolli di sicurezza e tenta di rilevare tracce di attività indesiderate. La fase di testing mostra che la libreria intercetta con successo le funzioni bersaglio, consentendo di bloccare il comportamento malevolo dell’applicazione. Valutiamo altresì la fattibilità di un programma che in modo automatico sfrutti tecniche di reverse engineering per decompilare un’applicazione, inserire al suo interno la libreria e ricompilare l’applicazione messa in sicurezza
    corecore