Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Exploring Photo Privacy Protection On Smartphones, David Darling Dec 2018

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla Dec 2018

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


Androparse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, Ibrahim Baggili Sep 2018

Androparse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware has become a major challenge. As a consequence, practitioners and researchers spend a significant time analyzing Android applications (APK). A common procedure (especially for data scientists) is to extract features such as permissions, APIs or strings which can then be analyzed. Current state of the art tools have three major issues: (1) a single tool cannot extract all the significant features used by scientists and practitioners (2) Current tools are not designed to be extensible and (3) Existing parsers do not have runtime efficiency. Therefore, this work presents AndroParse which is an open-source Android parser written in Golang ...


Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam Jun 2018

Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam

Electronic Theses, Projects, and Dissertations

Indoor Positioning System (IPS) focuses on locating objects inside

Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library ...


Assured Android Execution Environments, Brandon P. Froberg Mar 2018

Assured Android Execution Environments, Brandon P. Froberg

Theses and Dissertations

Current cybersecurity best practices, techniques, tactics and procedures are insufficient to ensure the protection of Android systems. Software tools leveraging formal methods use mathematical means to assure both a design and implementation for a system and these methods can be used to provide security assurances. The goal of this research is to determine methods of assuring isolation when executing Android software in a contained environment. Specifically, this research demonstrates security properties relevant to Android software containers can be formally captured and validated, and that an implementation can be formally verified to satisfy a corresponding specification. A three-stage methodology called "The ...


Cru Android App, Dylan Sun Mar 2018

Cru Android App, Dylan Sun

Computer Science and Software Engineering

The Cru app is focused on connecting students and faculty to one of the many Cru ministries here in San Luis Obispo. The app is capable of connecting individuals to a specific community group and ministry teams, gathering information about upcoming Cru events and gatherings, and direct rideshare capabilities. The Cru Android App utilizes Java and other industry standard technologies to fully deliver a well-rounded user experience and to be connected with Cru. In this project, I increased Cru app’s access control abilities and updated the app overall to be ready for an alpha release.


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was ...


Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi Jan 2018

Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi

Senior Projects Spring 2018

The focus of this paper is the functionality of Android applications and the detection of functional anomalies though a basic static analysis approach. The intention of this research is analyzing applications without running them and detecting how application behavior might correlate with method call patterns. We will focus on simple free compass applications because their ostensible simplicity will make high variation in methods calls an interesting phenomenon. We employ clustering algorithms and other statistical methods to isolate a particularly unusual collection of applications and then perform a qualitative analysis of these applications to discover any interesting common operational behavior or ...