STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4
Abstract
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android application is wrapped into an Android set file which contains the Dalvik byte code, data (pictures, sounds. etc.,) and a metadata file called the ―manifest. If the user wants to install an application, they have to approve all the permissions the developer has acknowledged in the manifest. The application is installed and receives group memberships, if all permissions are approved. The group memberships provoked to check the permissions at runtime
Authors and Affiliations
Radha S, Sinduja R. , Sowmya P, Brindha Devi V.
Grid Power Compensation by Micro Grid System with Bidirectional AC/DC Converter and DC/DC Converter PWM Strategy
To accomplish the power quality maintenance, DC-DC converter (buck and boost converter) and a bidirectional AC/DC converter is implemented. The available power from the micro grid is stored in a battery. The power from t...
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...
Monitoring of Diabetes in Children Based on the Internet of Things
This paper presents an eHealth platform to support an emerging multidimensional care approach for the treatment of diabetes. This approach works by means of remote collection and monitoring of patient data and provision...
INTERFACING OF LARGE SCALE SPECIMEN TESTING MACHINES IN BIG HOSPITALS TO HMS SOFTWARE USING RS 232
This paper provides an overview of importance of automation in the field of providing specimen test results to doctors in an efficient and real time manner for ensuring effective treatment i...
SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS
: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effecti...