Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Entire DC Network

Perspectives On Task Ownership In Mobile Operating System Development [Invited Talk], Subhajit Datta Nov 2014

Perspectives On Task Ownership In Mobile Operating System Development [Invited Talk], Subhajit Datta

Research Collection School Of Computing and Information Systems

There can be little contention about Stroustrup's epigrammatic remark: our civilization runs on software. However a caveat is increasingly due, much of the software that runs our civilization, runs on mobile devices today. Mobile operating systems have come to play a preeminent role in the ubiquity and utility of such devices. The development ecosystem of Android - one of the most popular mobile operating systems - presents an interesting context for studying whether and how collaboration dynamics in mobile development differ from conventional software development. In this paper, we examine factors that influence task ownership in Android development. Our results …


Semantics-Aware Android Malware Classification Using Weighted Contextual Api Dependency Graphs, Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao Nov 2014

Semantics-Aware Android Malware Classification Using Weighted Contextual Api Dependency Graphs, Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao

Research Collection School Of Computing and Information Systems

The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification methods fall into two general categories: 1) signature-based and 2) machine learning-based. Signature-based approaches can be easily evaded by bytecode-level transformation attacks. Prior learning-based works extract features from application syntax, rather than program semantics, and are also subject to evasion. In this paper, we propose a novel semantic-based approach that classifies Android malware via dependency graphs. To battle transformation attacks, we extract a weighted contextual API dependency graph as program semantics to …


Developer Involvement Considered Harmful? An Empirical Examination Of Android Bug Resolution Times, Subhajit Datta, Proshanta Sarkar, Subhashis Majumder Nov 2014

Developer Involvement Considered Harmful? An Empirical Examination Of Android Bug Resolution Times, Subhajit Datta, Proshanta Sarkar, Subhashis Majumder

Research Collection School Of Computing and Information Systems

In large scale software development ecosystems, there is a common perception that higher developer involvement leads to faster resolution of bugs. This is based on conjectures around more ``eyeballs" making bugs "shallow" -- whose validity and applicability are not without dispute. In this paper, we posit that the level of developer attention as well as its extent of diversity influence how quickly bugs get resolved. We report results from a study of 1,000+ Android bugs. We find statistically significant evidence that attention and diversity have contrasting relationships with the resolution time of bugs, even after controlling for factors such as …


Mental Health Awareness Building Via Android Application, James Faraday, Joshua Martin Aug 2014

Mental Health Awareness Building Via Android Application, James Faraday, Joshua Martin

Journal of Undergraduate Research at Minnesota State University, Mankato

The goal of this project was to create a tool that provides students at Minnesota State University, Mankato with mental health information through a freely available smartphone application (App). Our approach used a software engineering design process that focused on who our customers are, what resources are available, and how we can best connect the two to improve student lives. We identified the stakeholders involved and worked with campus mental health professionals to help shape our App. While there is a broad range of mental health topics, we have focused on materials related to depression. The first process of the …


Application Sharing From Mobile Devices With A Collaborative Shared Display, Richard S. Shurtz Jun 2014

Application Sharing From Mobile Devices With A Collaborative Shared Display, Richard S. Shurtz

Theses and Dissertations

With the increasing ubiquity of smartphones, tablets, and large pixel-rich displays, there are many exciting new possibilities for using these devices for collaborative work. While there already exist hardware and software that support communication and interaction between mobile devices and shared displays, application sharing in these scenarios is still limited and inflexible. We present a new method of application sharing which allows collaborators to download clips or snapshots of each other's applications. These snapshots can be used to re-launch and resume the shared application back to the state it was in when it was shared. We have built a system …


Pre-R: Making Health Care Healthier, Grant Ramil, Mark Corpuz, Eliot Mestre, Akshay Rangnekar, Alex Lin Jun 2014

Pre-R: Making Health Care Healthier, Grant Ramil, Mark Corpuz, Eliot Mestre, Akshay Rangnekar, Alex Lin

Computer Engineering

The Pre-R project provides a central database of medical service fees offered by hospitals across the United States. The database is crowdsourced and all data points are provided by end users or by hospital providers themselves. The fees are searchable through a website (www.pre-r.com) and iOS and Android applications. The mobile applications also provide a way for users to capture a picture of any medical bill and upload it for analysis and entry to our database.


Spirit: A Home Automation System, Andrew Choi Jun 2014

Spirit: A Home Automation System, Andrew Choi

Computer Engineering

Spirit is a multi device home automation system. Designed and implemented for California Polytechnic State University’s Senior Project program, this project was worked on during the duration of two school quarters from January 7, 2014 to June 13, 2014. The system consists of monitor/controllers designed to carry out everyday tasks in the average American household and an accompanying mobile application designed to receive information and control the devices. The monitor/controllers, or “Spirits”, are primarily developed using Arduino development tools and Arduino microcontroller boards. The spirits include a thermostat, named Tempus, an electrical outlet, Electrus, and a wall light switch, Luxos.


T.O.A.D: Tower Offense Android Development, Jeffrey Bryan Jun 2014

T.O.A.D: Tower Offense Android Development, Jeffrey Bryan

Computer Science and Software Engineering

TOAD is a tower offense game developed for Android smart phones and tablets. TOAD was developed to demonstrate applied principles of computer science and the software design process. The game engine was written as several components to handle various functions and allow for portability to other platforms. The end result is a fully functional game that can be used as a base to further expand on the idea and be showcased on Google Play.


A Systematic Security Evaluation Of Android’S Multi-User Framework, Edward Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du May 2014

A Systematic Security Evaluation Of Android’S Multi-User Framework, Edward Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Like many desktop operating systems in the 1990s, Android is now in the process of including support for multiuser scenarios. Because these scenarios introduce new threats to the system, we should have an understanding of how well the system design addresses them. Since the security implications of multi-user support are truly pervasive, we developed a systematic approach to studying the system and identifying problems. Unlike other approaches that focus on specific attacks or threat models, ours systematically identifies critical places where access controls are not present or do not properly identify the subject and object of a decision. Finding these …


Development Of Etsu Student Life Android Application, Tyler L. Cox May 2014

Development Of Etsu Student Life Android Application, Tyler L. Cox

Undergraduate Honors Theses

In this thesis, the author gives a description his journey creating and developing a Student Life Application for East Tennessee State University. This thesis will document his process with development as well as reflect on the struggles and victories in creation of this application.


A Customer Data Acquisition Application For Android, Richard William Preece May 2014

A Customer Data Acquisition Application For Android, Richard William Preece

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

This report discusses the development process and walkthrough of an application that is intended to aid businesses with two issues that they face on a consistent basis: customer data acquisition and eliminating expiring inventory.

In developing an application that can quickly and effortlessly acquire contact information from a customer, businesses can continue to offer deals that are of interest to customers. This can help to use inventory that would otherwise go to waste, as well as increase customer engagement by providing incentives to become a repeat customer.


How Many Eyeballs Does A Bug Need? An Empirical Validation Of Linus' Law, Subhajit Datta, Proshanta Sarkar, Sutirtha Das, Sonu Sreshtha, Prasanth Lade, Subhashis Majumder May 2014

How Many Eyeballs Does A Bug Need? An Empirical Validation Of Linus' Law, Subhajit Datta, Proshanta Sarkar, Sutirtha Das, Sonu Sreshtha, Prasanth Lade, Subhashis Majumder

Research Collection School Of Computing and Information Systems

Linus’ Law reflects on a key characteristic of open source software development: developers’ tendency to closely work together in the bug resolution process. In this paper we empirically examine Linus’ Law using a data-set of 1,000+ Android bugs, owned by 70+ developers. Our results indicate that encouraging developers to work closely with one another has nuanced implications; while one form of contact may help reduce bug resolution time, another form can have quite the opposite effect. We present statistically significant evidence in support of our results and discuss their relevance at the individual and organizational levels.


The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay Jan 2014

The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay

Australian Digital Forensics Conference

The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back …


Mobile Device Vulnerabilities & Securities, Luke Rondeau Jan 2014

Mobile Device Vulnerabilities & Securities, Luke Rondeau

Senior Honors Theses and Projects

An investigation on current mobile vulnerabilities and research into security. Also, a proof of concept to show the ease of injecting an Android phone with a virus.