• Title/Summary/Keyword: Android application

Search Result 795, Processing Time 0.032 seconds

An Efficient Interruption Handling for 3D Games based on Android Platform

  • Viet, Doan Quang;Choi, Chang Yeol
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.42-49
    • /
    • 2012
  • Recently the unprecedented progress of Android platform and Google Play has brought more opportunities for individual mobile game developers. When playing an Android 3D game, users can accidentally hit HOME Key or BACK Key or receive an incoming message. Subsequently, another screen will appear on top and make the game application lose focus, or the operating system pause that game. These interruption events may also lead to the loss of game information or the game runs out of user control if that game cannot catch interruption events itself and resume at the exact time. As same as other mobile platforms, Android platform also provides Activity Lifecycle methods to help the game application control interruption problems. However, these methods are not adequate to solve all the interruption events. By implementing ANDCube game, we examine most of the possible interruption cases and propose some solutions to help Android game developers avoid some common interruption cases. Concurrently, we show the ways how a game application can catch all unavoidable interruption events and effectively resume from interruption to obtain a high quality game.

Software Architecture Recovery for Android Application Reuse (안드로이드 어플리케이션의 재사용을 위한 소프트웨어 아키텍처 생성)

  • Park, Jin-Soo;Kwon, Jang-Jin;Hong, Jang-Eui;Choi, Min
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.9-17
    • /
    • 2013
  • Android applications market has increased rapidly due to the popularity of smart phones. In order to high competitiveness in the application market should be high productivity, reduce cost. And short development cycle is required because of increased the android applications demand. Owing to develop applications in short time, the requirements analysis, design process are able to omitted. But in the case of reuse application at development phase, involved many problems because omit document or design. so target of this paper is android application source code that omit document or design. we propose architecture recovery techniques from android application source code by reverse engineering with identify functions are reused. We expect that increase productivity and reduce development cost, smooth maintain by proposed technique.

  • PDF

An Android BLE Emulator for Developing Wearable Apps (웨어러블 어플리케이션 개발을 위한 안드로이드 BLE 에뮬레이터)

  • Moon, Hyeonah;Park, Sooyong;Choi, Kwanghoon
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.67-76
    • /
    • 2018
  • BLE (Bluetooth Low Energy) has been extensively used for communication between mobile applications and wearable devices in IoT (Internet of Things). In developing Android applications, wearable devices, on which the applications can run, should be available because the existing Android SDK does not support any BLE emulation facility. In this study, we have designed and implemented the first Android BLE emulator. Using this, we are able to develop and test BLE-based Android applications even when without wearable devices. We have also proposed an automatic generation method of Android BLE scenarios based on graph model. We have shown that the method is useful for systematically testing BLE application protocols by running the generated scenarios on the Android BLE emulator.

Design and Implementation of Server-based Resource Obfuscation Techniques for Preventing Copyrights Infringement to Android Contents (안드로이드 콘텐츠 저작권 침해 방지를 위한 서버 기반 리소스 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.13-20
    • /
    • 2016
  • Most software is distributed as a binary file format, so reverse engineering is not easy. But Android is based on the Java and running on virtual machine. So, Android applications can be analyzed by reverse engineering tools. To overcome this problem, various obfuscation techniques are developed. In android environment, the Proguard is most widely used because it is included in the Android SDK distribution package. The Proguard can protect the Java source code from reverse engineering analysis. But it has no function to protect resources like images, sounds and databases. In this paper, we proposed and implemented resource obfuscation framework to protect resources of android application. We expect that this framework can protect android resources effectively.

Android Based Mobile Booky Contents (안드로이드 기반 모바일 Booky 컨텐츠)

  • Oh, Bum-Kyo;Kang, Tae-Hwan;An, Beong-Ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.53-59
    • /
    • 2010
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform of application developers. In this paper, we develop an application contents Booky based on Google Android flatform by using Webview merits and Google search engine. The features of the developed content are as follows. First, a mobile-based Web browser which has an advanced screen resolution and can support more faster viewer than normal web browser as it reduces the amount of data transmission. Second, efficient E-book search and reading functionality. In the performance evaluation, we show the results of simulation using AVD(Android Virture Device).

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Dynamic Service Library Reconfiguration Method of Android Platform (안드로이드 기반 서비스 라이브러리의 동적 재구성)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1145-1153
    • /
    • 2013
  • Android mobile platform copy the class files of all applications installed in android platform and keep them into one directory. But to add the service library into a platform, Android must generate a new binary image of platform and replace the platform because android refer the libraries using the memory-mapped file method in a directory. And this memory-mapped file reference method waste the storage space of mobile device because that directory include the duplicated libraries if the libraries refered by application are duplicated, Therefore a dynamic reconfiguration method on android mobile platform is needed to manage the service libraries of application executed on android platform and support the version management and function addition/modification. In this paper, we propose the platform dynamic reconfiguration method to add dynmically the service libraries on android platform.

A Component-Based Application Framework for Context-Aware Smartphone Applications Based on Android (안드로이드에서 상황 인지 스마트폰 애플리케이션을 위한 컴포넌트 기반 애플리케이션 프레임워크)

  • Hwang, Seyoung;Lee, Hyunguk;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.621-628
    • /
    • 2013
  • This paper presents a framework for context-aware smart phone applications based on Android. The mobile context-aware system is composed of a low level context collection module, a high level context generation module and a service provision module. Existing android system cannot provide an appropriate application framework to integrate these independent modules. In this paper, we provide an application framework which make each module a component, and provide appropriate services to each component. This framework hides the Android platform, so that the complexity for organical combination can be minimized and the application developers can make the mobile context-aware applications easily.

A Risk Classification Based Approach for Android Malware Detection

  • Ye, Yilin;Wu, Lifa;Hong, Zheng;Huang, Kangyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.959-981
    • /
    • 2017
  • Existing Android malware detection approaches mostly have concentrated on superficial features such as requested or used permissions, which can't reflect the essential differences between benign apps and malware. In this paper, we propose a quantitative calculation model of application risks based on the key observation that the essential differences between benign apps and malware actually lie in the way how permissions are used, or rather the way how their corresponding permission methods are used. Specifically, we employ a fine-grained analysis on Android application risks. We firstly classify application risks into five specific categories and then introduce comprehensive risk, which is computed based on the former five, to describe the overall risk of an application. Given that users' risk preference and risk-bearing ability are naturally fuzzy, we design and implement a fuzzy logic system to calculate the comprehensive risk. On the basis of the quantitative calculation model, we propose a risk classification based approach for Android malware detection. The experiments show that our approach can achieve high accuracy with a low false positive rate using the RandomForest algorithm.

AIOPro: A Fully-Integrated Storage I/O Profiler for Android Smartphones (AIOPro: 안드로이드 스마트폰을 위한 통합된 스토리지 I/O 분석도구)

  • Hahn, Sangwook Shane;Yee, Inhyuk;Ryu, Donguk;Kim, Jihong
    • Journal of KIISE
    • /
    • v.44 no.3
    • /
    • pp.232-238
    • /
    • 2017
  • Application response time is critical to end-user response time in Android smartphones. Due to the plentiful resources of recent smartphones, storage I/O response time becomes a major key factor in application response time. However, existing storage I/O trace tools for Android and Linux give limited information only for a specific I/O layer which makes it difficult to combine I/O information from different I/O layers, because not helpful for application developer and researchers. In this paper, we propose a novel storage I/O trace tool for Android, called AIOPro (Android I/O profiler). It traces storage I/O from application - Android platform - system call - virtual file system - native file system - page cache - block layer - SCSI layer and device driver. It then combines the storage I/O information from I/O layers by linking them with file information and physical address. Our evaluations of real smartphone usage scenarios and benchmarks show that AIOPro can track storage I/O information from all I/O layers without any data loss under 0.1% system overheads.