Tuesday, May 5, 2020

Mining API-level Features for Robust Malware Detection in Android

Question: Discuss about the term for File management, manipulations and Permission-Model of Windows and Android Operating System? Answer: File management capabilities of Windows and Android operating system: Android file management system: The file management system of Android is quite advanced. The procedure is even better than apple ios. It allows easy access method and any other application according to the preference of the user. It does not include file manager application by default. There are some manufacturers activate preinstall their file manager application on their Android device. According to the need of the user, they mess up with this stuff. ES file explorer is maximum used file management application. The package is full of various powerful features Such as- ability to access shared networks, which is free of cost. Now it provides Holo-Style file manager interface (Aafer Yin, 2013). The user can use any of the submitted application. File system layout for the Android version: The Google Android file system is not identical to the PC's version. It includes different card those are- storage device or SD Card, official SD Card, root device or system file. It is pool storage to access and modify the file system. As on desktop operating system, some application dumps some data files (Gillett, 2013). This does not dump the confidential data as password login details rather it dumps the cache information. There are many ways to make free space on an Android device. There are few folders already existing in the apparatus. DCIM is a folder where different photos saved. File management capabilities in Windows operating system: Windows operate different operating systems Windows Vista, Windows 10, Windows 98, ME, Windows 7, NT, Windows 2000, Windows 8.1 etc. The objectives of file management are to define the terms file and folders, understanding the file and various memory storage capabilities including bytes gigabytes and kilobytes. The way to copy and create files, the method of file extension and association, and removing different files from the recycle bin. There are many ways to move files in a PC (Mehmannavaz, 2015). The built-in windows explorer, which is not similar to internet explorer, is a preferred path to be followed by the user. In the external hard disk, CD drives, hard drives stored different system. The explorer can organize and control them. File management capabilities of both the Windows and Android operating system: Discuss the merits of each file management system in Android: There are many file managers for Android. Each has some benefits and some disadvantages too. The biggest quality of Android over Windows is its ability to use Android device as a USB mass storage without string attachment. The anomalies like delete, copy, renaming are the powerful essential tools of file management. Root explorer app provides a root access capability. File expert gives access to FTP servers, shared content over Bluetooth. ES file explorer provides access to LAN, FTP, Bluetooth, and the internet (Berger, Nicklin Cain, 2013). Similarly, File Manager ES, MIUI File Explorer, File slick Explorer file management application, Total Commander provides different other permission to resolve various issues related to file management system. Windows file management system also has various advantages such as- a reduction of cost, proceeding to green, smooth workflow, higher security, reliable and flexible achievement (Wilson, 2015). Methods available for file manipulation: There are different methods followed for manipulating files. The method followed are- Clib.feof() Method tests the end of file stream Clib.fflush()Method - it flushes the stream of one or more than one open files Clib.fgetc()Method and Clib.getc()Method it gets a character from the creek file Clib.fgetpos()Method changes of cursor position in a file stream Clib.fprint()Method - write the formatted final output in the file stream Clib.fputc()Method and Clib.fputc()Method - to write characters in the file stream Clib.fputs()Method - writes string to file stream Clib.fread()Method - read information from the file stream Clib.fscan()Method -scan formatted i/p from the file stream Clib.fwrite()Method -write data to the file stream Clib.fseek()Method -set the cursor position to the file stream Clib.ftell()Method - to get the updated value of the cursor file Clib.rewind()Method - reset the file cursor The ways through which the user-define permissions implemented: The most formal model that is used by a user-defined permission is Alloy. It is a first order specified language based relational logic (Potharaju Molloy, 2012). It allows the different model to integrate other aspects of a system. It is based on official documentation on Android permission. A device consists of some relevant applications. Each of them contains zero or more than zero components. The applications change over time (Pistoia, 2015). An app may use permissions to control access to different components done by other applications. An app may assign its guard that is imposed on every individual component. The priority is based on specific permission related to the components. A set of by default build-in-permission is available in Android for the consumers. The application developers are implementing various permission models for the customer. References: Aafer, Y., Du, W., Yin, H. (2013). DroidAPIMiner: Mining API-level features for robust malware detection in android. InSecurity and Privacy in Communication Networks(pp. 86-103). Springer International Publishing. Chen, Y., Zhou, R. H. (2012). Design and implementation of mobile phone file management utility based on Android.Railway Computer Application,21(9), 47-51. Gillett Jr, R. B., Berger, M. A., Nicklin, J. C., Cain, B. E. (2013).U.S. Patent No. 8,417,746. Washington, DC: U.S. Patent and Trademark Office. Hamedi, H. R., Mehmannavaz, M. R. (2015). Manipulation of tunneling induced transparency windows and optical switching features in fivefold quantum dot molecules.Physica E: Low-dimensional Systems and Nanostructures,73, 189-197. Hay, R., Tripp, O., Pistoia, M. (2015, July). Dynamic detection of inter-application communication vulnerabilities in Android. InProceedings of the 2015 International Symposium on Software Testing and Analysis(pp. 118-128). ACM. Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., ... Molloy, I. (2012, October). Using probabilistic generative models for ranking risks of android apps. InProceedings of the 2012 ACM conference on Computer and communications security(pp. 241-252). ACM. Wilson, K. (2015). File Management in Windows. InEveryday Computing with Windows 8.1(pp. 29-37). Apress.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.