Symbian OS System Event Log and Postmortem Software Fault Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Symbian OS System Event Log and Postmortem Software Fault Analysis Symbian OS system event log and postmortem software fault analysis Zhigang Yang University of Tampere Department of Computer Sciences Computer Science M.Sc. thesis Supervisor: Jyrki.Nummenmaa, Erkki.J Salonen June 2008 ii University of Tampere Department of Computer Sciences Computer Science Zhigang Yang: Symbian OS system event log and postmortem software fault analysis M.Sc. thesis, 62 pages, 4 index and appendix pages June 2008 This thesis introduces a postmortem software failure analysis system named MobileCrash. The system is to catch Symbian OS panics and exceptions, to collect related information and to transmit crash logs to a central database for analysis. The basics of software failure analysis and similar systems on other operation systems are presented in the thesis. After revealing the system design of the MobileCrash, the system event log as a supplementary of the MobileCrash is introduced. The thesis also introduces the core of crash analysis together with real case studies in Symbian OS. Software developers can benefit from this thesis by learning about software failure analysis on Symbian OS. Project managers can get basic information on software failure analysis from this thesis to better control projects based on Symbian OS. Key words and terms: Symbian OS, crash analysis, MobileCrash, system event log iii Table of Contents 1. Introduction ...............................................................................................................1 2. Symbian OS based Smartphone software development............................................4 2.1 Smartphone overview................................................................................................4 2.2 Symbian OS design overview ...................................................................................5 3. Basics of software fault analysis ...............................................................................9 3.1 Automated support for software failure report..........................................................9 3.2 Postmortem Symbolic Evaluation and crash analysis.............................................10 4. MobileCrash system in general ...............................................................................13 4.1 MobileCrash developing requirements ...................................................................13 4.2 MobileCrash general design and implementation...................................................16 5. MobileCrash system event log ................................................................................21 5.1 Background information..........................................................................................21 5.2 System event log architect.......................................................................................23 5.3 System event log design..........................................................................................24 5.4 System event log improvement ...............................................................................28 6. Crash analysis on Symbian OS ...............................................................................31 6.1 Symbian OS crash analysis in general ....................................................................31 6.2 User side panic ........................................................................................................33 6.3 Kernel side panic.....................................................................................................35 6.4 Exceptions ...............................................................................................................38 7. Case studies .............................................................................................................43 7.1 Analyze the stack heuristically................................................................................45 7.2 Analyze application panic .......................................................................................47 7.3 Analyze application crash (exception) ....................................................................49 7.4 Analyze application crashes group by call stack.....................................................50 7.5 Summary..................................................................................................................52 8. Conclusions .............................................................................................................54 Appendix: Glossary 1 1. Introduction Nowadays, smartphones are very popular and widely used in people’s everyday life. Symbian OS based smartphones have the largest market share in this big family. By the end of the third quarter of 2007, there were 165 million Symbian smartphones cumulatively shipped and 134 different models in the global market [Symbian press releases, 2007]. Since large amount of smartphones shipped to the market, people are significantly changing the way to use and think over mobile phones. Smartphones are phones which combine mobility, a complete operating system with the ability to add applications, and information access. Smartphones have more features than traditional phones and are used as mobile personal computers giving access to the information world which keeps on expanding and growing rapidly. Smartphones provide a web browser to facilitate information access. However the information world can also be accessed through dedicated smartphone interfaces that make the experience more intuitive, more visual, and more valuable. Moreover just as the information world is steering the evolution of smartphones, the increasing popularity of smartphones will steer the next phase of the evolution of the information world [Wood, 2005]. The software used in smartphones is becoming ubiquitous. The powerful software, previously found only in desktop computers, now serves inside all kinds of smartphones. Without the support from thousands of third-party software, smartphones would not be as successful as in nowadays. Any computer software developers can write smartphone software, either to meet their own needs or to sell for a profit. Most smartphone software can be developed by standard programming languages and application interfaces provided by smartphone operation systems. However, debugging and analysing software faults in a smartphone development environment is not as easy as that in a computer desktop development environment. There are many runtime debuggers and source code level debuggers used in the computer desktop environment. In a smartphone development environment, tracing systems can be used in the early phase to find out problematic functions while there is no completed system service provided, for example this may be the case with device driver development. Emulators and run time debuggers for smartphones can be used to debug software faults when the smartphone operation system is in a relatively mature level. Nevertheless the development process becomes harder after the software has been deployed into the smartphone. It is difficult to check when, how and why a software fault has happened, and the fault information is difficult to collect as well. In Symbian 2 OS, MobileCrash is such a system which catches software faults, transmits fault logs, and helps analyzing software fault information from smartphones. In Wang’s master thesis, the MobileCrash system was firstly introduced and it is still undergoing development. There are two main functions of MobileCrash. Firstly, it provides a way to collect Symbian OS software fault data during the period when the software has been developed and deployed into the smartphone. Secondly, it provides a set of statistic data which can evaluate the product maturity. MobileCrash includes several software components installed on both smartphones and PCs. The system development includes techniques such as Symbian C++ development, Windows C++ development, Relationship Database and Web UI development [Wang, 2007]. In general, MobileCrash catches Symbian OS software faults by components called kernel agent and user agent. These MobileCrash agents installed on the smartphone can catch software faults, and collect useful data of the panicked software. The data includes panicked time call stack, a list of run time loaded binary modules, CPU registers, panic reason and category, CPU exception registers, the system event log and so on. Then MobileCrash transfers crash data via its SMS sender component through the GSM network into a crash log gateway which includes PC software components decoding and storing crash data into a database. Another option is to retrieve data from the smartphone via a USB connection to a PC workstation and forward them to the same server as the SMS sender component does. Software developers can check the decoded data through the MobileCrash web UI, and analyze that data to point out where the bug location might be in the panicked software component. The web UI also provides statistical data to help to analyze the software maturity level against software releases (Figure 1). 3 Figure 1. MobileCrash overview This paper will present new features and software fault analysis which are not presented in detail in Wang’s master thesis. To better understand the MobileCrash system and Symbian OS software fault analysis, the Symbian OS based smartphone design overview will be introduced in Chapter 2. Chapter 3 explains the software fault analysis as background knowledge. The MobileCrash system design in general is presented
Recommended publications
  • Mobile Platform Security Architectures: Software
    Lecture 3 MOBILE SOFTWARE PLATFORM SECURITY You will be learning: . General model for mobile platform security Key security techniques and general architecture . Comparison of four systems Android, iOS, MeeGo (MSSF), Symbian 2 Mobile platforms revisited . Android ~2007 . Java ME ~2001 “feature phones”: 3 billion devices! Not in smartphone platforms . Symbian ~2004 First “smartphone” OS 3 Mobile platforms revisited . iOS ~2007 iP* devices; BSD-based . MeeGo ~2010 Linux-based MSSF (security architecture) . Windows Phone ~2010 . ... 4 Symbian . First widely deployed smartphone OS EPOC OS for Psion devices (1990s) . Microkernel architecture: OS components as user space services Accessed via Inter-process communication (IPC) 5 Symbian Platform Security . Introduced in ~2004 . Apps distributed via Nokia Store Sideloading supported . Permissions are called ‘capabilities’, fixed set (21) 4 Groups: User, System, Restricted, Manufacturer 6 Symbian Platform Security . Applications identified by: UID from protected range, based on trusted code signature Or UID picked by developer from unprotected range Optionally, vendor ID (VID), based on trusted code signature 7 Apple iOS . Native application development in Objective C Web applications on Webkit . Based on Darwin + TrustedBSD kernel extension TrustedBSD implements Mandatory Access Control Darwin also used in Mac OS X 8 iOS Platform Security . Apps distributed via iTunes App Store . One centralized signature authority Apple software vs. third party software . Runtime protection All third-party software sandboxed with same profile Permissions: ”entitlements” (post iOS 6) Contextual permission prompts: e.g. location 9 MeeGo . Linux-based open source OS, Intel, Nokia, Linux Foundation Evolved from Maemo and Moblin . Application development in Qt/C++ . Partially buried, but lives on Linux Foundation shifted to HTML5- based Tizen MeeGo -> Mer -> Jolla’s Sailfish OS 10 MeeGo Platform Security .
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Tracking of Mental Workload with a Mobile EEG Sensor
    sensors Article Tracking of Mental Workload with a Mobile EEG Sensor Ekaterina Kutafina 1,2,* , Anne Heiligers 3, Radomir Popovic 1 , Alexander Brenner 4, Bernd Hankammer 1, Stephan M. Jonas 5, Klaus Mathiak 3 and Jana Zweerings 3 1 Institute of Medical Informatics, Medical Faculty, RWTH Aachen University, 52074 Aachen, Germany; [email protected] (R.P.); [email protected] (B.H.) 2 Faculty of Applied Mathematics, AGH University of Science and Technology, 30-059 Krakow, Poland 3 Department of Psychiatry, Psychotherapy and Psychosomatics, School of Medicine, RWTH Aachen University, 52074 Aachen, Germany; [email protected] (A.H.); [email protected] (K.M.); [email protected] (J.Z.) 4 Institute of Medical Informatics, University of Münster, 48149 Münster, Germany; [email protected] 5 Department of Informatics, Technical University of Munich, 85748 Garching, Germany; [email protected] * Correspondence: ekutafi[email protected] Abstract: The aim of the present investigation was to assess if a mobile electroencephalography (EEG) setup can be used to track mental workload, which is an important aspect of learning performance and motivation and may thus represent a valuable source of information in the evaluation of cognitive training approaches. Twenty five healthy subjects performed a three-level N-back test using a fully mobile setup including tablet-based presentation of the task and EEG data collection with a self- mounted mobile EEG device at two assessment time points. A two-fold analysis approach was chosen including a standard analysis of variance and an artificial neural network to distinguish the levels of cognitive load.
    [Show full text]
  • A Comparative Analysis of Mobile Operating Systems Rina
    International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users.
    [Show full text]
  • Secure Communications in the Smart Grid
    University of Nevada, Reno Secure Communications in the Smart Grid A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering by Hayreddin Ceker Dr. Mehmet H. Gunes/Thesis Advisor Aug 2013 Copyright by Hayreddin Ceker 2013 UNIVERSITY OF NEVADA RENO THE GRADUATE SCHOOL We recommend that the thesis prepared under our supervision by HAYREDDIN CEKER entitled Secure Communications in the Smart Grid be accepted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Mehmet H Gunes, Ph.D., Advisor Murat Yuksel, Ph.D., Committee Member Yantao Shen, Ph.D., Graduate School Representative Marsha H. Read, Ph.D., Dean, Graduate School August, 2013 i Secure Communications in the Smart Grid Hayreddin Ceker University of Nevada, Reno, 2013 Supervisor: Mehmet Hadi Gunes Abstract Smart grid has diverse stake holders that often require varying levels of access to grid state and measurements. At the distribution level (i.e., MAN), smart grid provides two way communication between households and utilities. At the transmis- sion level (i.e., WAN), multiple organizations need to share the transmission lines and cooperate with participants in their region. Efficient and reliable operation of the grid depends on accurate state measurements and secure data transfer to oper- ation centers. These tasks are complicated by the vast amount of data from diverse sources that are owned by multiple entities that impose physical, economic, market, and political constraints on the data sharing. However, to protect against grid-wide failures and defend against coordinated attacks, power grid operators need to increase data sharing.
    [Show full text]
  • Android Bluetooth Monitoring
    Android Bluetooth monitoring Hendrik Mende Fachbereich Elektrotechnik University of Applied Science M¨unster A thesis submitted for the degree of Bachelor of Science 2012 I dedicate this thesis to Braximo and the Abraxianer, great friends. Acknowledgements Foremost, I would like to express my gratitude to my supervisor Oresti Ba˜nos Legr´an for the support of my Bachelor studies and research, his guidance, motivation and enthusiasm. His continued advice and encouragement kept me focused. I must express my gratitude to Prof. Dr.-Ing. Peter Gl¨osek¨otter from the University of applied science M¨unster and Ignacio Rojas Ruiz from the Universidad de Granada, who made this thesis possible. I am grateful for the support from my friends and family, especially Hanna, Cati and Andreas with whom I spend a quality time and was able to explore and enjoy the many faces of Granada. Finally I would like to thank the Fachbereich f¨ur Elektrotechnik at the University of applied science M¨unster and the Escuela T´ecnica Superior de Ingenier´ıas Inform´atica y de Telecomunicaci´on at the Uni- versidad de Granada for giving me the opportunity to hold my final semester abroad. Abstract The ever progressing technological development of mobile phones, sen- sor technology and wireless communication systems have made a ubiq- uitous, permanent mobile monitoring of vital signs of the human body possible in recent times. Sensor devices are now small enough to be worn on the body and are able to provide data via a wireless network. The increasing computational performance of smart phones make pro- cessing and analysing of sensor data in a real time manner available.
    [Show full text]
  • Preparation of Papers in 2-Column Format
    INTEGRATION OF LINUX COMMUNICATION STACKS INTO EMBEDDED OPERATING SYSTEMS Jer-Wei Chuangξ, Kim-Seng Sewξ, Mei-Ling Chiang+, and Ruei-Chuan Changξ Department of Information Management+ National Chi-Nan University, Puli, Taiwan, R.O.C. Email: [email protected] Department of Computer and Information Scienceξ National Chiao-Tung University, Hsinchu, Taiwan, R.O.C. Email: [email protected], [email protected] Thus, various operating systems design dedicated for embedded systems are thus created, such as PalmOS ABSTRACT [22], EPOC [12], Windows CE [25], GEOS [16], As the explosion of Internet, Internet connectivity is QNX [23], Pebble [2,17], MicroC/OS [21], eCos [11], required for versatile computing systems. TCP/IP LyraOS [3-7,18,19,26], etc. protocol is the core technology for this connectivity. As the explosion of Internet, adding Internet However, to implement TCP/IP protocol stacks for a connectivity is required for embedded systems. target operating system from the scratch is a TCP/IP protocol [8,9,24] is the core technology for time-consuming and error-prone task. Because of the this connectivity. However, to implement the TCP/IP spirit of GNU GPL and open source codes, Linux protocol stacks for a target operating system from the gains its popularity and has the advantages of stability, scratch is a time-consuming and error-prone task. reliability, high performance, and well documentation. Because of the spirit of GNU General Public License These advantages let making use of the existing open (GPL) [15] and open source codes, Linux [1] gains its source codes and integrating Linux TCP/IP protocol popularity and has the advantages of stability, reli- stacks into a target operating system become a ability, high performance, and well documentation.
    [Show full text]
  • The Symbian OS Architecture Sourcebook
    The Symbian OS Architecture Sourcebook The Symbian OS Architecture Sourcebook Design and Evolution of a Mobile Phone OS By Ben Morris Reviewed by Chris Davies, Warren Day, Martin de Jode, Roy Hayun, Simon Higginson, Mark Jacobs, Andrew Langstaff, David Mery, Matthew O’Donnell, Kal Patel, Dominic Pinkman, Alan Robinson, Matthew Reynolds, Mark Shackman, Jo Stichbury, Jan van Bergen Symbian Press Head of Symbian Press Freddie Gjertsen Managing Editor Satu McNabb Copyright 2007 Symbian Software, Ltd John Wiley & Sons, Ltd The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners.
    [Show full text]
  • Mobile OS: Analysis of Customers’ Values
    Mobile OS: analysis of customers’ values Georgii Shamugiia Bachelor's Thesis Business Administration 2020 Mobile OS 01.11.2020 Author(s) Georgii Shamugiia Degree programme Bachelor of Business Administration SAMPO18 Report/thesis title Number of pages Mobile OS: analysis of customer's values and appendix pages 14 + 47 The rapid development of the mobile industry since the start of new millennium led to much more extensive usage of mobile devices than desktop computers. Fast-developing technol- ogies of wireless networking led to the excessive need of a device, which can search any info on the web conveniently, be a decent communicational tool and be able to adapt to dif- ferent needs of customers. The device which fully fulfils this need is a smartphone, which is being widely used today by the majority of the global population. In this thesis, the author digests the tools, which allows smartphones to work appropriately, give consumers a pleasuring experience while using them and run all the operations and data stored on them. These tools are mobile op- erating systems – platforms, which allow all those things and even more. In this research, the author investigates the historical development of mobile operating systems, which put a mark in the history of the industry. By digesting three cases of Nokia, Blackberry and Mi- crosoft, the author explains what were the selling points, that succeeded and managed to popularise each mobile operating system globally among consumers and gadget manufac- turers and what were the reasons that caused their global downfall. A separate chapter of this research is dedicated to a survey regarding customer values and customer opinions about mobile devices and mobile operating systems.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Rhyming Dictionary
    Merriam-Webster's Rhyming Dictionary Merriam-Webster, Incorporated Springfield, Massachusetts A GENUINE MERRIAM-WEBSTER The name Webster alone is no guarantee of excellence. It is used by a number of publishers and may serve mainly to mislead an unwary buyer. Merriam-Webster™ is the name you should look for when you consider the purchase of dictionaries or other fine reference books. It carries the reputation of a company that has been publishing since 1831 and is your assurance of quality and authority. Copyright © 2002 by Merriam-Webster, Incorporated Library of Congress Cataloging-in-Publication Data Merriam-Webster's rhyming dictionary, p. cm. ISBN 0-87779-632-7 1. English language-Rhyme-Dictionaries. I. Title: Rhyming dictionary. II. Merriam-Webster, Inc. PE1519 .M47 2002 423'.l-dc21 2001052192 All rights reserved. No part of this book covered by the copyrights hereon may be reproduced or copied in any form or by any means—graphic, electronic, or mechanical, including photocopying, taping, or information storage and retrieval systems—without written permission of the publisher. Printed and bound in the United States of America 234RRD/H05040302 Explanatory Notes MERRIAM-WEBSTER's RHYMING DICTIONARY is a listing of words grouped according to the way they rhyme. The words are drawn from Merriam- Webster's Collegiate Dictionary. Though many uncommon words can be found here, many highly technical or obscure words have been omitted, as have words whose only meanings are vulgar or offensive. Rhyming sound Words in this book are gathered into entries on the basis of their rhyming sound. The rhyming sound is the last part of the word, from the vowel sound in the last stressed syllable to the end of the word.
    [Show full text]
  • Symbian Phone Security
    Symbian phone Security Job de Haas ITSX Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Overview • Symbian OS. • Security Risks and Features. • Taking it apart. • Conclusions. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian History • Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 • EPOC32 was designed with OO in C++ • 1998: Symbian Ltd. formed by Ericsson, Nokia, Motorola and Psion. • EPOC renamed to Symbian OS • Currently ~30 phones with Symbian and 15 licensees. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Organization • Symbian licenses the main OS • Two GUI’s on top of Symbian: – Series 60, led by Nokia – UIQ, subsidiary of Symbian • Ownership: – Nokia 47.5% Panasonic 10.5% – Ericsson 15.6% Siemens 8.4% – SonyEricsson 13.1% Samsung 4.5% Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Versions • EPOC32 • EPOC R5 • Symbian v6.0 • Symbian v7.0 • Symbian v8.0 • Symbian v9.0 announced for Q3 ‘05 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Series60 versions • 1st edition • 2nd edition • 3rd edition, announced feb. 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 UIQ versions • UIQ 1.0 • UIQ 2.1 • UIQ 3.0 released feb 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS • Multitasking, preemptive kernel. • MMU protection of kernel and process spaces. • Strong Client – Server architecture • Plug-in patterns • Filesystem in ROM, Flash, RAM and on SD-card Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian development • Symbian v6 and v7 are compiled with a modified GCC.
    [Show full text]