فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی











متن کامل


نویسندگان: 

دی پیر محمود

اطلاعات دوره: 
  • سال: 

    1396
  • دوره: 

    5
  • شماره: 

    1 (پیاپی 17)
  • صفحات: 

    73-83
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    917
  • دانلود: 

    253
چکیده: 

با گسترش روز افزون بدافزارها در اندروید به عنوان پرکاربردترین سیستم عامل همراه، دانستن میزان خطر امنیتی هر نرم افزار می تواند در اعلام هشدار به کاربر نسبت به استفاده از بدافزارهای احتمالی، موثر باشد. مخاطرات امنیتی نرم افزارهای اندروید از طریق مجوزهای درخواستی آنها قابل تخمین است. در این مقاله با توجه به میزان سوء استفاده از مجوزهای درخواستی توسط بدافزارهای شناخته شده قبلی، مفهوم مجوز بحرانی به صورت دقیقتری تعریف شده است. بر اساس این تعریف و با تحلیل مجوزهای درخواستی توسط بدافزارها و نرم افزارهای مفید شناخته شده، معیار جدیدی به منظور اندازه گیری خطر امنیتی نرم افزارهای اندروید ارائه شده است. در این معیار مجوزهایی اثر بیشتری در محاسبه مقدار خطر امنیتی دارند که بهره اطلاعاتی بیشتری در تمایز بدافزارها داشته باشند. آزمایشهای صورت گرفته نشان دهنده نرخ تشخیص بالاتر و قابلیت تعمیم پذیری بیشتر معیار ارائه شده نسبت به معیارهای قبلی است.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 917

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 253 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    1
  • صفحات: 

    13-25
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    88
  • دانلود: 

    0
چکیده: 

Most of the current research on static analysis of Android applications for Security vetting either works on Java source code or the Dalvik bytecode. Nevertheless, Android allows developers to use C or C++ code in their programs compiled into various binary architectures. Moreover, Java and the native code components (C or C++) can collaborate using the Java Native Interface. Recent research shows that native codes are frequently used in both benign and malicious Android applications. Most of the present Android static analysis tools avert considering native codes in their analysis and applied trivial models for their data-flow analysis. As we know, only the open-source JN-SAF tool has tried to solve this issue statically. However, there are still challenges like libC functions and multi-threading in native codes that we want to address in this work. We presented SANT as an extension of JN-SAF for supporting Static Analysis of Native Threads. We considered modeling libC functions in our data-flow analysis to have a more precise analysis when dealing with Security vetting of native codes. We also used control flow and data dependence graphs in SANT to handle multiple concurrent threads and find implicit data-flow between them. Our experiments show that the conducted improvements outperform JN-SAF in real-world benchmark applications.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 88

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2017
  • دوره: 

    9
  • شماره: 

    2
  • صفحات: 

    11-17
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    195
  • دانلود: 

    0
چکیده: 

In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the crucial and essential parts of Android OSs architecture including the framework and the Android kernel layers. As a regard, we explain the Binder component of Android OS from Security point of view. Then, we demonstrate how to penetrate into the Binder and control data exchange mechanism in Android OS by proposing a kernel level attack model based on the hooking method. In addition, we provide a method to detect these kinds of attacks on Android frameworks and the kernel layer. As a result, by implementing the attack model, it is illustrated that the Android processes are detectable and the data can be extracted from any process and system calls. On the other hand, by using our detection proposed method the possibility of using this attack approach in the installed applications on the Android smartphones will be sharply decreased.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 195

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    1402
  • دوره: 

    2
  • شماره: 

    3 (پیاپی 5)
  • صفحات: 

    51-61
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    190
  • دانلود: 

    26
چکیده: 

Purpose: Food Security is a critical global challenge that is influenced by research and innovation in the field. Therefore, the objective of this study is to analyze the scientific output of developing countries in food Security and examine its relationship with patents and Gross Domestic Product (GDP).Methodology: This applied research utilized the Scientometric approach. A total of 8,416 papers published between 1992-2023 in the field of food Security by developing countries were included in the study using citation databases from Clarivate Analytics. Additionally, patent registrations from the WIPO database and GDP data from the World Bank were analyzed. Information was collected through note-taking, and the data was analyzed using Pearson's correlation coefficient.Findings: The findings reveal an upward trend in the publication and citation of scientific outputs related to food Security in developing countries. China has higher numbers of papers, patents, GDP, and food production index compared to Iran, Japan, and South Korea. There is also a positive correlation observed between population and the number of papers, gross production and the number of papers, food production and the number of published papers, as well as the number of patents and papers citing scientific outputs of countries.Conclusion: These results highlight the significant relationship between increasing scientific output, GDP, the number of patents, and food Security. Greater emphasis on food Security contributes to enhanced scientific output, GDP, and innovation. Similarly, increasing scientific output, GDP, and innovation positively impact food Security in countries.Value: This study emphasizes the importance of scientific outputs in driving technological advancements, innovations, and ultimately, ensuring food Security in developing countries.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 190

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

MIRZAEI H. | Heydarnoori A.

نشریه: 

Scientia Iranica

اطلاعات دوره: 
  • سال: 

    2019
  • دوره: 

    26
  • شماره: 

    3 (Transactions D: Computer Science and Engineering and Electrical Engineering)
  • صفحات: 

    1567-1588
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    297
  • دانلود: 

    0
چکیده: 

In software programs, most of the time, there is a chance for occurrence of faults in general, and exception faults in particular. Localizing those pieces of code that are responsible for a particular fault is one of the most complicated tasks, and it can produce incorrect results if done manually. Semi-automated and fully-automated techniques have been introduced to overcome this issue. However, despite recent advances in fault localization techniques, they are not necessarily applicable to Android applications because of their special characteristics such as context-awareness, use of sensors, being executable on various mobile devices, limited hardware resources, etc. To this aim, in this paper, a semi-automated hybrid method is introduced that combines static and dynamic analyses to localize exception faults in Android applications. Our evaluations of nine open source Android applications of di erent sizes with various exceptions show that the technique proposed in this paper can correctly identify root causes of the occurred exceptions. These results indicate that our proposed approach is e ective in practice in localizing exception faults in Android applications.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 297

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

BJORNTORP P.

اطلاعات دوره: 
  • سال: 

    1996
  • دوره: 

    239
  • شماره: 

    2
  • صفحات: 

    105-110
تعامل: 
  • استنادات: 

    1
  • بازدید: 

    105
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 105

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    3
  • صفحات: 

    61-69
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    41
  • دانلود: 

    0
چکیده: 

Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android Security mechanism,hence, a failure in the design of APS can potentially lead to vulnerabilities that grant unauthorized access to resources by malicious applications. In this paper, we present a formal approach for modeling and verifying the Security properties of APS. We demonstrate the usability of the proposed approach by showcasing the detection of a well-known vulnerability found in Android’, s custom permissions.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 41

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1402
  • دوره: 

    11
  • شماره: 

    3
  • صفحات: 

    49-55
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    74
  • دانلود: 

    20
چکیده: 

با افزایش ضریب نفوذ اینترنت در زندگی و استفاده آحاد مردم از این فناوری در همه ابعاد، به کارگیری از دستگاه های گوشی تلفن همراه نیز به همین نسبت افزایش داشته است. این موضوع در کنار خلق مزایای فراوان، موجب گسترش و تسریع انتشار برخی برنامه های مخرب به نام بدافزار  گردیده است. در این پژوهش سعی بر آن است که با استفاده از شبکه عصبی چندلایه و یادگیری ماشین تشخیص بدافزارهای روز صفر  در تلفن های هوشمند صورت گیرد. برای این منظور از دیتاست  استاندارد با بیش از 15 هزار نمونه از انواع بدافزار و خوب افزار به صورت برچسب گذاری شده بهره گیری شده است. در مرحله پیش پردازش ابتدا با استفاده از نرمال سازی و یکسان سازی داده ها انجام می شود و با تجزیه وتحلیل مؤلفه های اصلی عمل انتخاب ویژگی صورت گرفته و از تعداد 1183 ویژگی تعداد 215 ویژگی که واریانس بالاتری دارند انتخاب می شود و پس ازآن مدل پیشنهادی معرفی شده است که از طبقه بند شبکه عصبی چندلایه و الگوریتم بهینه سازی مبتنی بر آموزش و یادگیری است که با اعمال آن بر روی پایگاه داده های ذکرشده و مقایسه نتایج طبقه بندی آن با الگوریتم های ماشین بردار، الگوریتم ژنتیک ، نزدیک ترین همسایه و ...  می توان دریافت که آموزش شبکه عصبی چندلایه یادگیری دقت و صحت را بالا می برد. نتایج استفاده از شبکه عصبی چندلایه مبتنی بر آموزش و یادگیری حاکی از دقت 99% و صحت 98% است.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 74

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 20 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Nomiko D. | Bar A. | Monalisa M.

اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    12
  • شماره: 

    2
  • صفحات: 

    181-187
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    7
  • دانلود: 

    0
چکیده: 

Aims: Breast cancer is among the most common cancer types. This study aimed to develop an Android-based detection application for assessing breast cancer risk. Materials & Methods: This quasi-experimental study utilized a research and development approach, employing a pre- and post-test design with one group. The development and field-testing phase took place between July and August 2023, involving 59 women of childbearing age purposively selected within the operational vicinity of Puskesmas Simpang IV Sipin, Jambi City, Indonesia. The application successfully underwent testing, including evaluation by media and material validators. Subsequently, a comprehension test was conducted with three respondents individually, ten individuals in a small group, and 59 participants in a large group. In the field test, data are presented descriptively, including frequencies. The Wilcoxon test was utilized to determine a causal relationship between the product’s usage and the observed impact. Findings: The development of the breast cancer risk assessment application involved several key stages, including the identification stage (comprising problem analysis, context, and literature), the application model design stage, and the material and media validation stage. The media validation process was conducted twice, with the findings yielding a score of 67, averaging 3.35 (meeting valid criteria), while material validation received an average score of 3.0 (also meeting valid criteria). A Wilcoxon test conducted on the knowledge variable revealed a significant increase, with the mean value before the intervention at 8.44 and post-intervention rising to 12.29. Conclusion: Women of childbearing age readily accept Android-based breast cancer risk detection applications, and their usage has a positive impact on increasing their knowledge.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 7

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    10
تعامل: 
  • بازدید: 

    31
  • دانلود: 

    0
چکیده: 

The increasing expansion of mobile phones along with the expansion of the possibilities of these phones has provided a suitable field for information theft. Android is undoubtedly the most popular and widespread operating system of mobile phones, which has become the target audience of many malware authors due to this expansion. This article seeks to provide a suitable and powerful solution for detecting malware. Data processing uses a combined feature selection operation. This idea extracts the most important features and improves the accuracy and speed of detection. Then, three-level stacking is used for the detection stage. This method can significantly improve the accuracy and power of generalization compared to other methods based on the innovative idea of dataset separation. The accuracy of this method is equal to 99. 5.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 31

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button