Current Issue : April - June Volume : 2017 Issue Number : 2 Articles : 6 Articles
The number of devices running the Android operating system is increasing with over 900\nmillion Android devices currently registered. As the Android operating system grows, security\nbecomes increasingly important. While the current Android operating system protects against\nsystem compromising viruses, it does not provide full protection against malware, adware,\nspyware and Trojan viruses. This creates issues for device security, privacy, and functionality.\nTo counter this, a number of antivirus applications have been made available to detect such\nmalicious applications that host these viruses. However, with more hackers looking to Android,\nit is essential that users have the best antivirus applications to protect their devices. In this\nstudy, fifteen applications that host malware, adware, spyware and Trojan viruses were\nprogrammed to test antivirus applications. The viruses also displayed how the harmful code can\nbe incorporated into an Android application. Additionally, a web server was programmed to\naccept data from the host applications. The efficacies of the twenty most popular antivirus\napplications were determined by introducing the viruses into the target phone through Android\napplication packages. After testing all twenty applications, it was found that Mobile Security &\nAntivirus by AVAST Software detected all fifteen harmful applications, making it the most\neffective antivirus application tested. On the other hand, the other nineteen Android antivirus\napplications detected, at most, four of the host applications. The experiment can serve to\nmaximize security on devices running Android and provide understanding of how antivirus\napplications function....
To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and\nuniform quality scores for tested reconstructed images. We propose a new approach to measure the visual quality of\nthe reconstructed image for visual secret sharing schemes. We developed an object detection method in the context\nof secret sharing, detecting outstanding local features and global object contour. The quality metric is constructed\nbased on the object detection-weight map. The effectiveness of the proposed quality metric is demonstrated by a\nseries of experiments. The experimental results show that our quality metric based on secret object detection\noutperforms existing metrics. Furthermore, it is straightforward to implement and can be applied to various\napplications such as performing the security test of the visual secret sharing process....
Different domains of computing systems require higher level of focus towards specific\nquality factors like privacy, integrity, flexibility, usability etc. Moreover, certain\nquality factors help in each other�s existence while others oppose each other significantly.\nUsability of software applications is one factor that reduces security and privacy\nup to a substantial level. This paper examines the differences between usability\nfactors and aspects related to security and privacy. A clear understanding of gaps\nbetween these two opposing factors has been presented in this paper. In addition, an\naccount of efforts carried out to bridge these gaps has also been presented. We have\ndivided these efforts into the categories of guidelines, frameworks and use of technology.\nThe fields of e-banking and social networks have been considered specifically\nfor identification of gaps in these particular fields....
The fields of safety and security use different conceptual standards and methods.\nAs a consequence, these two separate but related research areas utilize\ndifferent approaches. Addressing the integration between safety and security\nconcerns in this context, we would conduct a survey exploring approaches\nand standards that were created by the scholars to combine safety and security\nrequirement engineering....
The data and applications in cloud computing reside in cyberspace, that allowing\nto users access data through any connection device, when you need to\ntransfer information over the cloud, you will lose control of it. There are multi\ntypes of security challenge must be understood and countermeasures. One of\nthe major security challenges is resources of the cloud computing infrastructures\nare provided as services over the Internet, and entire data in the cloud\ncomputing are reside over network resources, that enables the data to be\naccess through VMs. In this work, we describe security techniques for securing\na VCCI, VMMs such as Encryption and Key Management (EKM), Access\nControl Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM),\nVirtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we\nfocus on security of virtual resources in Virtualized Cloud Computing Infrastructure\n(VCCI), Virtual Machine Monitor (VMM) by describing types of\nattacks on VCCI, and vulnerabilities of VMMs and we describe the techniques\nfor securing a VCCI....
The monitoring, control, and security guarantee for the communication in the wireless sensor networks\n(WSNs) are currently treated as three independent issues and addressed separately through specialized tools.\nHowever, most cases of WSNs applications requires the network administrator change the network configuration in\na very short time to response to the change of observed phenomenon with security guarantee. To meet this\nrequirement, we propose a security enhanced monitoring and control platform named SecMAS for WSNs, which\nprovides the real-time visualization about network states and online reconfiguration of the network properties and\nbehaviours in a resource-efficient way. Besides, basic cryptographic primitives and part of the anomaly detection\nfunctionalities are implemented in SecMAS to enabling the secure communication in WSNs. Furthermore, we\nconduct experiments to evaluate the performance of SecMAS in terms of the latency, throughput, communication\noverhead, and the security capacity. The experimental results demonstrate that the SecMAS system achieves stable,\nefficient and secure data collection with lightweight quick-response network control....
Loading....