Designing Multiscale Hybrid Platform for Testing and Evaluationg Iot Systems Osama Abu Oun

Total Page:16

File Type:pdf, Size:1020Kb

Designing Multiscale Hybrid Platform for Testing and Evaluationg Iot Systems Osama Abu Oun Designing multiscale hybrid platform for testing and evaluationg IoT systems Osama Abu Oun To cite this version: Osama Abu Oun. Designing multiscale hybrid platform for testing and evaluationg IoT systems. Other [cs.OH]. Université de Franche-Comté, 2015. English. NNT : 2015BESA2015. tel-01508640 HAL Id: tel-01508640 https://tel.archives-ouvertes.fr/tel-01508640 Submitted on 14 Apr 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse de Doctorat école doctorale sciences pour l’ingénieur et microtechniques UNIVERSITÉ DE FRANCHE-COMTÉ Conception D’une Plate-Forme Multi-Échelle Hybride pour Évaluer Les Performances de Systèmes Orientés Internet des Objets n OSAMA ABU OUN Thèse de Doctorat école doctorale sciences pour l’ingénieur et microtechniques UNIVERSITÉ DE FRANCHE-COMTÉ N◦ 2 0 1 5 0 5 9 THÈSE présentée par OSAMA ABU OUN pour obtenir le Grade de Docteur de l’Université de Franche-Comté Spécialité : Informatique Conception D’une Plate-Forme Multi-Échelle Hybride pour Évaluer Les Performances de Systèmes Orientés Internet des Objets Soutenue publiquement le 09 Octobre 2015 devant le Jury composé de : JULIEN BOURGEOIS Président Professeur à l’Université de Franche- Comté THIERRY DIVOUX Rapporteur Professeur à l’Université de Lorraine FRÉDÉRIC WEIS Rapporteur Maître de Conférences HDR à l’Université de Rennes BENOÎT HILT Examinateur Maître de Conférences à l’Université de Haute-Alsace FRANÇOIS SPIES Directeur de thèse Professeur à l’Université de Franche- Comté CHRISTELLE BLOCH Co-Directeur de thèse Maître de conférences à l’Université de Franche-Comté REMERCIEMENTS Le bon déroulement et la rédaction de cette thèse n’aurait pu avoir lieu sans le soutien de l’ensemble de l’équipe du département DISC au Laboratoire Femto-ST à Montbéliard, je tiens à les en remercier. Je remercie particulièrement: • Monsieur François SPIES, Professeur des Universités, Université de Franche- Comté • Madame Christelle BLOCH, Maître de conférences à l’Université de Franche- Comté qui m’ont accueilli au sein de l’équipe de recherche de Montbéliard et suivi tout au long de ma thèse. Je tiens à remercier: • Monsieur Thierry DIVOUX, Professeur des Universités, Université de Lorraine. • Monsieur Frédéric WEIS, Maître de Conférences à l’Université de Rennes. pour l’intérêt qu’ils on manifesté pour mon travail et pour avoir accepté d’être les rapporteurs. • Monsieur Benoît HILT, Maître de Conférences à l’Université de Haute-Alsace. • Monsieur Julien BOURGEOIS, Professeur à l’Université de Franche-Comté. pour avoir accepté d’être membres de mon jury. Enfin, je remercie ma famille et mes amis pour leurs encouragements et leur confiance. v vi vii À ma mère, Rihab, qu’elle repose en paix CONTENTS I Principles and Fundamentals5 1 Introduction7 1.1 Objectives of the thesis . .8 1.1.1 Internet of Things As A Service (IoTaaS) . .8 1.1.2 Connectionless Data Exchanges (COLDE) . .9 1.2 Plan of the thesis . .9 2 State of the Art 11 2.1 Testing Internet of Things . 13 2.1.1 Test Automation . 14 2.1.2 Wireless Sensor Network (WSN) . 15 2.1.3 Smart Cities . 15 2.2 Wi-Fi-Based Communication Methods . 17 2.2.1 Multiple-Connections Wi-Fi . 17 2.2.2 Connectionless Wi-Fi . 18 2.3 Broadcasting Solutions . 19 2.3.1 Blind Flooding Method . 19 2.3.2 Probability-Based Methods . 20 2.3.3 Area-Based Methods . 20 2.3.4 Neighbor Knowledge Methods . 21 2.4 Wi-Fi-Based Indoor Positioning and Localization . 21 2.4.1 Proximity Detection . 21 2.4.2 Fingerprinting . 22 2.4.3 Trilateration and Triangulation . 22 2.5 Wi-Fi-Based Emergency Evacuation . 23 2.6 Conclusion . 24 3 Fundamentals of Application Testing and Evaluation 25 3.1 General Categorization . 26 3.2 Test-Case-Based Categorization . 27 ix x CONTENTS 3.2.1 Random Testing . 27 3.2.2 Scenario-Based Testing (Structure) . 28 3.3 Application-Based Categorization . 28 3.3.1 Web Application Testing . 28 3.3.2 Mobile Application Testing . 29 II Contribution - IoTaaS 35 4 Internet of Things Testing As A Service (IoTaaS) 37 4.1 Introduction . 37 4.2 IoTaaS Concept . 37 4.3 IoTaaS Architecture . 38 4.4 Things . 40 4.4.1 Entities . 40 4.4.2 Emulators . 40 4.5 Gateways . 41 4.6 Network Emulation Protocol (NEP) . 41 4.6.1 NEP Server . 42 4.6.2 NEP Emulator . 43 4.6.2.1 NEP Controller . 43 4.6.2.2 NEP Updater . 44 4.6.3 NEP Client . 44 4.6.4 NEP Scenario . 44 4.7 Scenarios . 45 4.7.1 Scenario Files . 46 4.7.2 Scenario Manager . 48 4.7.3 Scenario Launcher . 49 4.8 Cloud . 51 4.9 Servers . 52 4.10 User . 53 4.11 Conclusion . 53 5 IoTaaS Pilot Implementation 55 5.1 Introduction . 55 5.2 Mobile Operating System . 55 CONTENTS xi 5.3 Server Architecture . 57 5.3.1 Daemon . 58 5.3.2 Things Manager . 59 5.3.2.1 Devices . 61 5.3.2.2 Emulators . 61 5.3.3 Graphical User Interface (GUI) . 63 5.3.4 Cloud Manager . 66 5.3.4.1 Controller . 67 5.3.4.2 Parent-Communicator . 69 5.3.4.3 Child-servers Manager . 70 5.3.5 Scenarios . 70 5.3.6 Traffic Shaper . 72 5.3.7 Logging . 73 5.4 Experiments and Results . 74 5.4.1 Environment Design . 74 5.4.2 Environment Installation . 75 5.4.3 Scenario and Results . 76 5.5 Conclusion . 76 III Contribution - COLDE 77 6 Connectionless Data Exchange (COLDE) 79 6.1 Introduction . 79 6.2 IEEE 802.11 (Wi-Fi) . 80 6.2.1 Network Architecture Models . 80 6.2.2 IEEE 802.11 Key Concepts . 80 6.2.2.1 IEEE 802.11 Architecture Model . 80 6.2.2.2 IEEE 802.11 MAC Frames . 83 6.2.2.3 IEEE 802.11 MAC Management Frames . 84 6.2.3 IEEE 802.11 Station Access Phases . 85 6.3 COLDE Protocol Stack . 86 6.4 COLDE Design and Structure . 87 6.4.1 COLDE - Working Method . 88 6.4.2 COLDE Frames . 89 6.4.3 COLDE Hierarchy . 91 xii CONTENTS 6.4.3.1 Node Types . 92 6.4.3.2 Main-Nodes selection criteria . 94 6.4.4 MULTI-TIER BROADCAST . 94 6.5 Lightweight Services Exchange System . 96 6.5.1 System Entities . 96 6.5.2 System Design . 96 6.5.3 Service Mechanism . 97 6.6 COLDE Security . 98 6.7 Conclusion . 101 7 COLDE Implementation 103 7.1 Introduction . 103 7.2 Broadcasting Information In Variably Dense Environment . 103 7.2.1 Introduction . 103 7.2.2 Simulation . ..
Recommended publications
  • AMNESIA 33: How TCP/IP Stacks Breed Critical Vulnerabilities in Iot
    AMNESIA:33 | RESEARCH REPORT How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Published by Forescout Research Labs Written by Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels and Amine Amri RESEARCH REPORT | AMNESIA:33 Contents 1. Executive summary 4 2. About Project Memoria 5 3. AMNESIA:33 – a security analysis of open source TCP/IP stacks 7 3.1. Why focus on open source TCP/IP stacks? 7 3.2. Which open source stacks, exactly? 7 3.3. 33 new findings 9 4. A comparison with similar studies 14 4.1. Which components are typically flawed? 16 4.2. What are the most common vulnerability types? 17 4.3. Common anti-patterns 22 4.4. What about exploitability? 29 4.5. What is the actual danger? 32 5. Estimating the reach of AMNESIA:33 34 5.1. Where you can see AMNESIA:33 – the modern supply chain 34 5.2. The challenge – identifying and patching affected devices 36 5.3. Facing the challenge – estimating numbers 37 5.3.1. How many vendors 39 5.3.2. What device types 39 5.3.3. How many device units 40 6. An attack scenario 41 6.1. Other possible attack scenarios 44 7. Effective IoT risk mitigation 45 8. Conclusion 46 FORESCOUT RESEARCH LABS RESEARCH REPORT | AMNESIA:33 A note on vulnerability disclosure We would like to thank the CERT Coordination Center, the ICS-CERT, the German Federal Office for Information Security (BSI) and the JPCERT Coordination Center for their help in coordinating the disclosure of the AMNESIA:33 vulnerabilities.
    [Show full text]
  • Comparison of GUI Testing Tools for Android Applications
    Comparison of GUI testing tools for Android applications University of Oulu Department of Information Processing Science Master’s Thesis Tomi Lämsä Date 22.5.2017 2 Abstract Test automation is an intriguing area of software engineering, especially in Android development. This is since Android applications must be able to run in many different permutations of operating system versions and hardware choices. Comparison of different tools for automated UI testing of Android applications is done in this thesis. In a literature review several different tools available and their popularity is researched and the structure of the most popular tools is looked at. The two tools identified to be the most popular are Appium and Espresso. In an empirical study the two tools along with Robotium, UiAutomator and Tau are compared against each other in test execution speed, maintainability of the test code, reliability of the test tools and in general issues. An empirical study was carried out by selecting three Android applications for which an identical suite of tests was developed with each tool. The test suites were then run and the execution speed and reliability was analysed based on these results. The test code written is also analysed for maintainability by calculating the lines of code and the number of method calls needed to handle asynchrony related to UI updates. The issues faced by the test developer with the different tools are also analysed. This thesis aims to help industry users of these kinds of applications in two ways. First, it could be used as a source on what tools are over all available for UI testing of Android applications.
    [Show full text]
  • Symbian OS Platform Security Model
    THE SYMBIAN OS BECAME FULLY OPEN sourced in February 2010, which opens even BO LI, ELENA RESHETOVA, AND T U O M A S A U R A more possibilities for application develop- ers to understand and analyze its security Symbian OS solution. We present a short introduction to the software features of Symbian plat- platform form security: three trust tiers, capability model, data caging, and the Symbian signed security model process. We also try to compare the security Bo Li is a second-year student in the master’s solution with the classical design principles program in security and mobile computing in this area, as well as briefly discuss gen- at Aalto University, Finland. He got his bach- elor’s degree in communications engineering eral design challenges and potential weak- in 2008 from Fudan University, China. nesses. [email protected] Elena Reshetova is a senior security engineer Introduction at Nokia, as well as a postgraduate student at Aalto University. She is interested in With the development of mobile devices and mo- various research areas related to platform bile computers, more and more people rely strongly security, security aspects of networking, and on them. People use mobile devices and mobile cryptography. computers to arrange their schedules, contact each [email protected] other, process emails, and share rich media con- tent. People believe it is safe to do so because it Tuomas Aura is a professor at Aalto Uni- versity, Finland. His research interests are feels secure just knowing it is “right there with security and privacy in communications you” [8].
    [Show full text]
  • 1921 Tulsa Race Riot Reconnaissance Survey
    1921 Tulsa Race Riot Reconnaissance Survey Final November 2005 National Park Service U.S. Department of the Interior CONTENTS INTRODUCTION 1 Summary Statement 1 Bac.ground and Purpose 1 HISTORIC CONTEXT 5 National Persp4l<live 5 1'k"Y v. f~u,on' World War I: 1896-1917 5 World W~r I and Postw~r ( r.: 1!1t7' EarIV 1920,; 8 Tulsa RaCR Riot 14 IIa<kground 14 TI\oe R~~ Riot 18 AIt. rmath 29 Socilot Political, lind Economic Impa<tsJRamlt;catlon, 32 INVENTORY 39 Survey Arf!a 39 Historic Greenwood Area 39 Anla Oubi" of HiOlorK G_nwood 40 The Tulsa Race Riot Maps 43 Slirvey Area Historic Resources 43 HI STORIC GREENWOOD AREA RESOURCeS 7J EVALUATION Of NATIONAL SIGNIFICANCE 91 Criteria for National Significance 91 Nalional Signifiunce EV;1lu;1tio.n 92 NMiol\ill Sionlflcao<e An.aIYS;s 92 Inl~ri ly E~alualion AnalY'is 95 {"",Iu,ion 98 Potenl l~1 M~na~menl Strategies for Resource Prote<tion 99 PREPARERS AND CONSULTANTS 103 BIBUOGRAPHY 105 APPENDIX A, Inventory of Elltant Cultural Resoun:es Associated with 1921 Tulsa Race Riot That Are Located Outside of Historic Greenwood Area 109 Maps 49 The African American S«tion. 1921 51 TI\oe Seed. of c..taotrophe 53 T.... Riot Erupt! SS ~I,.,t Blood 57 NiOhl Fiohlino 59 rM Inva.ion 01 iliad. TIll ... 61 TM fighl for Standp''''' Hill 63 W.II of fire 65 Arri~.. , of the Statl! Troop< 6 7 Fil'lal FiOlrtino ~nd M~,,;~I I.IIw 69 jii INTRODUCTION Summary Statement n~sed in its history.
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Android Studio Development Essentials Android 7 Edition Android Studio Development Essentials – Android 7 Edition
    Android Studio Development Essentials Android 7 Edition Android Studio Development Essentials – Android 7 Edition ISBN-13: 978-1535425339 © 2016 Neil Smyth. All Rights Reserved. This book is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved. The content of this book is provided for informational purposes only. Neither the publisher nor the author offers any warranties or representation, express or implied, with regard to the accuracy of information contained in this book, nor do they accept any liability for any loss or damage arising from any errors or omissions. This book contains trademarked terms that are used solely for editorial purposes and to the benefit of the respective trademark owner. The terms used within this book are not intended as infringement of any trademarks. Rev: 1.0 Table of Contents 1. Introduction ......................................................................................................................................... 1 1.1 Downloading the Code Samples ........................................................................................................... 2 1.2 Download the eBook ............................................................................................................................ 2 1.3 Feedback .............................................................................................................................................. 2 1.4 Errata ...................................................................................................................................................
    [Show full text]
  • Operating in a New Environment
    EMBEDDED DESIGN OPERATING SYSTEMS lthough the concept of the IoT was Ioated around the turn of the Millennium, it is A only recently that the approach has gathered significant momentum. But, because it is a blanket term, IoT is not only being applied to large and small applications alike, it is also being applied in a wide range of end markets. With such a spread, it will come as no surprise to discover that one size does not fit all when it comes to operating systems. At the high end of the market, companies like Intel are vying to provide a complete solution. Alongside its processor technology, Intel can integrate Wind River’s VxWorks operating system and McAfee security software to create a system capable of handling high levels of complexity. But those developing wearable devices, for example, may not want to take advantage of such a system; they may well be looking for an OS that runs in a very small footprint but, nonetheless, offers a range of Operating in a new necessary features while consuming minimal amounts of power. ARM has had its eyes on the sector for some time and, last year, rolled out environment a significant extension to its mbed programme. Previously, mbed was an embedded development community The Internet of Things is posing challenges to OS developers. with ambitions similar to those of Arduino and Raspberry Pi. But mbed How are they responding? By Graham Pitcher. now has a much bigger vision – the IoT. As part of this approach, it is creating mbed OS (see fig 1).
    [Show full text]
  • RIOT: an Open Source Operating System for Low-End Embedded Devices in the Iot Emmanuel Baccelli, Cenk Gundo¨ Gan,˘ Oliver Hahm, Peter Kietzmann, Martine S
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2815038, IEEE Internet of Things Journal 1 RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT Emmanuel Baccelli, Cenk Gundo¨ gan,˘ Oliver Hahm, Peter Kietzmann, Martine S. Lenders, Hauke Petersen, Kaspar Schleiser, Thomas C. Schmidt, and Matthias Wahlisch¨ Abstract—As the Internet of Things (IoT) emerges, compact low-end IoT devices. RIOT runs on minimal memory in the operating systems are required on low-end devices to ease devel- order of ≈10kByte, and can run on devices with neither MMU opment and portability of IoT applications. RIOT is a prominent (memory management unit) nor MPU (memory protection free and open source operating system in this space. In this paper, we provide the first comprehensive overview of RIOT. We cover unit). The goal of this paper is to provide an overview of the key components of interest to potential developers and users: RIOT, both from the operating system point of view, and from the kernel, hardware abstraction, and software modularity, both an open source software and ecosystem point of view. conceptually and in practice for various example configurations. We explain operational aspects like system boot-up, timers, power Prior work [28], [29] has surveyed the space of operating management, and the use of networking. Finally, the relevant APIs as exposed by the operating system are discussed along systems for low-end IoT devices.
    [Show full text]
  • Mobile Developer's Guide to the Galaxy
    Don’t Panic MOBILE DEVELOPER’S GUIDE TO THE GALAXY U PD A TE D & EX TE ND 12th ED EDITION published by: Services and Tools for All Mobile Platforms Enough Software GmbH + Co. KG Sögestrasse 70 28195 Bremen Germany www.enough.de Please send your feedback, questions or sponsorship requests to: [email protected] Follow us on Twitter: @enoughsoftware 12th Edition February 2013 This Developer Guide is licensed under the Creative Commons Some Rights Reserved License. Editors: Marco Tabor (Enough Software) Julian Harty Izabella Balce Art Direction and Design by Andrej Balaz (Enough Software) Mobile Developer’s Guide Contents I Prologue 1 The Galaxy of Mobile: An Introduction 1 Topology: Form Factors and Usage Patterns 2 Star Formation: Creating a Mobile Service 6 The Universe of Mobile Operating Systems 12 About Time and Space 12 Lost in Space 14 Conceptional Design For Mobile 14 Capturing The Idea 16 Designing User Experience 22 Android 22 The Ecosystem 24 Prerequisites 25 Implementation 28 Testing 30 Building 30 Signing 31 Distribution 32 Monetization 34 BlackBerry Java Apps 34 The Ecosystem 35 Prerequisites 36 Implementation 38 Testing 39 Signing 39 Distribution 40 Learn More 42 BlackBerry 10 42 The Ecosystem 43 Development 51 Testing 51 Signing 52 Distribution 54 iOS 54 The Ecosystem 55 Technology Overview 57 Testing & Debugging 59 Learn More 62 Java ME (J2ME) 62 The Ecosystem 63 Prerequisites 64 Implementation 67 Testing 68 Porting 70 Signing 71 Distribution 72 Learn More 4 75 Windows Phone 75 The Ecosystem 76 Implementation 82 Testing
    [Show full text]
  • Symbian Foundation Press Conference
    Symbian Foundation Press conference M/C – Merran Wrigley Exciting Internet experiences for the aspirations of billions 2 © 2008 Symbian Foundation Mobile software set free Symbian Foundation Kai Öistämö Executive Vice President, Nokia Shared vision for an unparalleled open mobile software platform 4 © 2008 Symbian Foundation That unites Symbian OS, S60, UIQ and MOAP(S) 5 © 2008 Symbian Foundation Creating the most proven, open, complete mobile software platform 6 © 2008 Symbian Foundation With over 200 million devices already shipped 7 © 2008 Symbian Foundation For free. 8 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience MOAP(S) 9 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience Symbian Foundation Platform Applications suite Runtimes UI framework Middleware Operating system Tools & SDK 10 © 2008 Symbian Foundation The first step to our goal • Acquiring Symbian Ltd • Closing expected in Q4 2008 • Symbian Ltd to be part of Nokia • Nokia will contribute Symbian OS and S60 to Symbian Foundation 11 © 2008 Symbian Foundation Fulfilling the Symbian mission Symbian Foundation Nigel Clifford CEO, Symbian Symbian Ltd Mission To become the most widely used software platform on the planet 13 © 2008 Symbian Foundation The leading global open platform 12% Symbian Linux 11% Microsoft RIM 60% Apple 11% Other Source Canalys – Cumulative 4% 12 month period to Q1 2008 2% 14 © 2008 Symbian Foundation The choice for the top vendors Samsung MOTO
    [Show full text]
  • A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks
    A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre To cite this version: Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre. A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks. Communications Surveys and Tutorials, IEEE Communications Society, Institute of Electrical and Electronics Engineers, 2018, 20 (3), pp.1799 - 1825. 10.1109/COMST.2018.2820810. hal-01886690 HAL Id: hal-01886690 https://hal.archives-ouvertes.fr/hal-01886690 Submitted on 23 Apr 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1 A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Z. Papadopoulos, Member, IEEE, Antoine Gallais, Periklis Chatzimisios, Senior Member, IEEE, and Fabrice Theoleyre,´ Senior Member, IEEE, Abstract—Envisioned communication densities in Internet of may be used for counting the number of vehicles, such to Things (IoT) applications are increasing continuously. Because control optimally the street traffic lights and to reduce the these wireless devices are often battery powered, we need waiting time [3]. specific energy efficient (low-power) solutions.
    [Show full text]
  • Behavioral Analysis of Android Applications Using Automated Instrumentation
    2013 Seventh International Conference on Software Security and Reliability Companion Behavioral Analysis of Android Applications Using Automated Instrumentation Mohammad Karami, Mohamed Elsabagh, Parnian Najafiborazjani, and Angelos Stavrou Computer Science Department, George Mason University, Fairfax, VA 22030 { mkarami, melsabag, pnajafib, astavrou}@gmu.edu Abstract—Google’s Android operating system has become one application is not a straight forward task due to variety of the most popular operating system for hand-held devices. Due inputs and heterogeneity of the technologies [12]. to its ubiquitous use, open source nature and wide-spread Two primary methods are being employed for mobile appli- popularity, it has become the target of recent mobile malware. In this paper, we present our efforts on effective security cation analysis: white-box approach and black-box approach. inspection mechanisms for identification of malicious applications In black-box testing only the inputs and outputs of the appli- for Android mobile applications. To achieve that, we devel- cation are being exercised. On the other hand, for white box oped a comprehensive software inspection framework. Moreover, approach the source code need to be analyzed. Since the source to identify potential software reliability flaws and to trigger code of the malicious applications that we get from Google malware, we develop a transparent instrumentation system for automating user interactions with an Android application that Play is not available we cannot analyze the internal structure does not require source code. Additionally, for run-time behavior of the malicious applications to figure out what they exactly analysis of an application, we monitor the I/O system calls gener- do, but we can utilize the black-box testing to define their ated the by application under monitoring to the underlying Linux functionality.
    [Show full text]