Dynamic Analysis of at Interface for Android Smartphones

Total Page:16

File Type:pdf, Size:1020Kb

Dynamic Analysis of at Interface for Android Smartphones Opening Pandora’s Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones Imtiaz Karim Fabrizio Cicala Syed Rafiul Hussain Purdue University Purdue University Purdue University [email protected] [email protected] [email protected] Omar Chowdhury Elisa Bertino University of Iowa Purdue University [email protected] [email protected] ABSTRACT 9–13, 2019, San Juan, PR, USA. ACM, New York, NY, USA, 15 pages. https: This paper focuses on checking the correctness and robustness of //doi.org/10.1145/3359789.3359833 the AT command interface exposed by the cellular baseband proces- sor through Bluetooth and USB. A device’s application processor 1 INTRODUCTION uses this interface for issuing high-level commands (or, AT com- Modern smartphones operate with two interconnected processing mands) to the baseband processor for performing cellular network units—an application processor for general user applications and a operations (e.g., placing a phone call). Vulnerabilities in this inter- baseband processor (also known as a cellular modem) for cellular face can be leveraged by malicious Bluetooth peripherals to launch connectivity. The application processor can issue ATtention com- pernicious attacks including DoS and privacy attacks. To identify mands (or, AT commands) [22] through the radio interface layer such vulnerabilities, we propose ATFuzzer that uses a grammar- (RIL, also called AT interface) to interact with the baseband pro- guided evolutionary fuzzing approach which mutates production cessor for performing different cellular network operations (e.g., rules of the AT command grammar instead of concrete AT com- placing a phone call). Most of the modern smartphones also accept mands. Empirical evaluation with ATFuzzer on 10 Android smart- AT commands once connected via Bluetooth or USB. phones from 6 vendors revealed 4 invalid AT command grammars Problem and scope. Since the AT interface is an entry point for over Bluetooth and 13 over USB with implications ranging from accessing the baseband processor, any incorrect behavior in pro- DoS, downgrade of cellular protocol version (e.g., from 4G to 3G/2G) cessing AT commands may cause unauthorized access to private to severe privacy leaks. The vulnerabilities along with the invalid information, inconsistent system states, and crashes of the RIL dae- AT command grammars were responsibly disclosed to affected mon and the telephony stack. This paper thus focuses on the follow- vendors and two of the reported vulnerabilities have been already ing research question: Is it possible to develop a systematic approach assigned CVEs (CVE-2019-16400 and CVE-2019-16401). for analyzing the correctness and robustness of the baseband-related AT command execution process to uncover practically-realizable vul- CCS CONCEPTS nerabilities? • Security and privacy → Mobile and wireless security; Dis- Incorrect execution of AT commands may manifest in one of tributed systems security; Denial-of-service attacks. the following forms: (1) Syntactic errors: the device accepts and processes syntactically invalid AT commands; and (2) Semantic vio- KEYWORDS lations: the device processes syntactically correct AT commands, but does not conform to the prescribed behavior. Successful ex- Android Smartphone Security and Privacy, Vulnerabilities, Attack ploitations of such invalid commands may enable malicious periph- ACM Reference Format: eral devices (e.g., a headset), connected to the smartphone over Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Bluetooth, to access phones’s sensitive information, such as, IMSI and Elisa Bertino. 2019. Opening Pandora’s Box through ATFuzzer: Dy- (International Mobile Subscriber Identity, unique to a subscriber) namic Analysis of AT Interface for Android Smartphones. In 2019 An- and IMEI (International Mobile Equipment Identity, unique to a nual Computer Security Applications Conference (ACSAC ’19), December device), or to downgrade the cellular protocol version or stop the cellular Internet, even when the peripheral is only allowed to access Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed phone’s call and media audio. for profit or commercial advantage and that copies bear this notice and the full citation Prior efforts. Existing approaches [43, 44, 53] strive to identify the on the first page. Copyrights for components of this work owned by others than ACM types of valid AT commands (i.e., commands with valid inputs/ar- must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a guments conforming to 3GPP reference [1, 9, 11, 12, 52] or vendor- fee. Request permissions from [email protected]. specific commands [13, 14, 18, 21] added for vendor customization) ACSAC ’19, December 9–13, 2019, San Juan, PR, USA exposed through USB interfaces on modern smartphone platforms © 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-7628-0/19/12...$15.00 and the functionality they enable. Yet these studies have at least https://doi.org/10.1145/3359789.3359833 one of the following limitations: (A) The analyses [53] do not test 529 the robustness of the AT interface in the face of invalid commands; on the fitness score of each grammar, ATFuzzer selects the parent (B) The analyses [53] only consider USB interface and thus leave grammars for crossover operation. We design a grammar-aware the Bluetooth interface to the perils of both valid and invalid AT two-point crossover operation to generate a diverse set of valid and commands; and (C) The analyses [30, 43, 45, 49] are not general invalid grammars. After the crossover operations, we incorporate enough to be applicable to smartphones from different vendors. three proposed mutation strategies to include randomness within Challenges. Conceptually, one can approach our problem using the grammar itself. The intuition behind using both crossover and one of the following two techniques: (1) static analysis; (2) dynamic mutation operations is for testing the integrity of each command analysis. As the source code of firmwares is not always available, a field as well as the command sequence1. static analysis-based approach would have to operate on a binary Findings. To evaluate the generality and effectiveness of our ap- level. The firmware binaries, when available, are often obfuscated proach, we evaluated ATFuzzer on 10 Android smartphones (from 6 and encrypted. Making such binaries amenable to static analysis different vendors) with both Bluetooth and USB interfaces. ATFuzzer requires substantial manual reverse engineering effort. To make has been able to uncover a total of 4 erroneous AT grammars over matters worse, such manual efforts are often firmware-version spe- Bluetooth and another 13 AT grammars over USB. Impacts of these cific and may not apply to other firmwares, even when theyare errors range from complete disruption of cellular network con- from the same vendor. Using dynamic analysis-based approaches nectivity to retrieval of sensitive personal information. We show also often requires instrumenting the binary to obtain coverage practical attacks through Bluetooth that can downgrade or shut- information for guiding the search. Like static analysis, such instru- down Internet connectivity, and also enable illegitimate exposure mentation requires reverse engineering effort which again is not of IMSI and IMEI when such impacts are not achievable through scalable. Also, during dynamic analysis, due to the separation of valid AT commands. In addition, the syntactically and semanti- the two processors, it is often difficult to programmatically detect cally flawed AT commands over USB can cause crashes, compound observable RIL crashes from the application processor. Finally, in actions, and syntactically incorrect commands to get processed. many cases, undesired AT commands are blacklisted [2–4] and For instance, an invalid AT command ATDI in LG Nexus 5 induces hence can induce rate-limiting by completely shutting down the AT the program to execute two valid AT commands— ATD (dial) and interface. The only way to recover from such a situation is to reboot ATI (display IMEI), simultaneously. These anomalies add a new the test device which can substantially slow down the analysis. dimension to the attack surface when blacklisting or access control Our approach. In this paper, we propose ATFuzzer which can test mechanisms are put in place to protect the devices from valid yet the correctness and robustness of the AT interface. One of the key menacing AT commands. The vulnerabilities along with the invalid objectives driving the design of ATFuzzer is discovering problematic AT command grammars were responsibly disclosed to the affected input formats instead of just some misbehaving concrete AT com- vendors. Among the discovered vulnerabilities, two of them (i.e., mands. Towards this goal, ATFuzzer employs a grammar-guided DoS and privacy leaks attacks) have been assigned CVEs (CVE- evolutionary fuzzing-based approach. Unlike typical mutation-based 2019-16400 [5] and CVE-2019-16401 [6]). [28, 35–37, 46, 59] and generation-based [20, 31, 54] fuzzers, ATFuzzer Contributions. The paper has the following contributions: follows a different strategy. It mutates the production rules of theAT command grammars and uses sampled instances of the generated
Recommended publications
  • Enabling Musical Applications on a Linux Phone
    University of Wollongong Research Online Faculty of Creative Arts - Papers (Archive) Faculty of Arts, Social Sciences & Humanities 2009 Enabling Musical Applications On A Linux Phone Greg Schiemer University of Wollongong, [email protected] E. Chen Royal Melbourne Institute of Technology Follow this and additional works at: https://ro.uow.edu.au/creartspapers Part of the Arts and Humanities Commons, and the Social and Behavioral Sciences Commons Recommended Citation Schiemer, Greg and Chen, E.: Enabling Musical Applications On A Linux Phone 2009. https://ro.uow.edu.au/creartspapers/36 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] ENABLING MUSICAL APPLICATIONS ON A LINUX PHONE Greg Schiemer Eva Cheng Sonic Arts Research Network School of Electrical and Computer Faculty of Creative Arts Engineering University of Wollongong RMIT Melbourne 2522 3000 The prospect of using compiled Arm9 native code of- fers a way to synthesise music using generic music soft- ABSTRACT ware such as Pure data and Csound rather than interpre- tive languages like java and python which have been Over the past decade the mobile phone has evolved to used in mobile devices [1, 2]. A similar approach to mo- become a hardware platform for musical interaction and bile synthesis has been adopted using the Symbian oper- is increasingly being taken seriously by composers and ating system [3]. instrument designers alike. Its gradual evolution has seen The Linux environment is more suited to the devel- improvements in hardware architecture that require al- opment of new applications in embedded hardware than ternative methods of programming.
    [Show full text]
  • Anurag Sharma | 1 © Vivekananda International Foundation Published in 2021 by Vivekananda International Foundation
    Anurag Sharma | 1 © Vivekananda International Foundation Published in 2021 by Vivekananda International Foundation 3, San Martin Marg | Chanakyapuri | New Delhi - 110021 Tel: 011-24121764 | Fax: 011-66173415 E-mail: [email protected] Website: www.vifindia.org Follow us on Twitter | @vifindia Facebook | /vifindia All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Anurag Sharma is a Research Associate at Vivekananda International Foundation (VIF). He has completed MPhil in Politics and International Relations on ‘International Security’ at the Dublin City University in Ireland, in 2018. His thesis is titled as “The Islamic State Foreign Fighter Phenomenon and the Jihadi Threat to India”. Anurag’s main research interests are terrorism and the Internet, Cybersecurity, Countering Violent Extremism/Online (CVE), Radicalisation, Counter-terrorism and Foreign (Terrorist) Fighters. Prior to joining the Vivekananda International Foundation, Anurag was employed as a Research Assistant at Institute for Conflict Management. As International affiliations, he is a Junior Researcher at TSAS (The Canadian Network for Research on Terrorism, Security, And Society) in Canada; and an Affiliate Member with AVERT (Addressing Violent Extremism and Radicalisation to Terrorism) Research Network in Australia. Anurag Sharma has an MSc in Information Security and Computer Crime, major in Computer Forensic from University of Glamorgan (now University of South Wales) in United Kingdom and has an online certificate in ‘Terrorism and Counterterrorism’ from Leiden University in the Netherlands, and an online certificate in ‘Understanding Terrorism and the Terrorist Threat’ from the University of Maryland, the United States.
    [Show full text]
  • Prohibited Agreements with Huawei, ZTE Corp, Hytera, Hangzhou Hikvision, Dahua and Their Subsidiaries and Affiliates
    Prohibited Agreements with Huawei, ZTE Corp, Hytera, Hangzhou Hikvision, Dahua and their Subsidiaries and Affiliates. Code of Federal Regulations (CFR), 2 CFR 200.216, prohibits agreements for certain telecommunications and video surveillance services or equipment from the following companies as a substantial or essential component of any system or as critical technology as part of any system. • Huawei Technologies Company; • ZTE Corporation; • Hytera Communications Corporation; • Hangzhou Hikvision Digital Technology Company; • Dahua Technology company; or • their subsidiaries or affiliates, Entering into agreements with these companies, their subsidiaries or affiliates (listed below) for telecommunications equipment and/or services is prohibited, as doing so could place the university at risk of losing federal grants and contracts. Identified subsidiaries/affiliates of Huawei Technologies Company Source: Business databases, Huawei Investment & Holding Co., Ltd., 2017 Annual Report • Amartus, SDN Software Technology and Team • Beijing Huawei Digital Technologies, Co. Ltd. • Caliopa NV • Centre for Integrated Photonics Ltd. • Chinasoft International Technology Services Ltd. • FutureWei Technologies, Inc. • HexaTier Ltd. • HiSilicon Optoelectronics Co., Ltd. • Huawei Device Co., Ltd. • Huawei Device (Dongguan) Co., Ltd. • Huawei Device (Hong Kong) Co., Ltd. • Huawei Enterprise USA, Inc. • Huawei Global Finance (UK) Ltd. • Huawei International Co. Ltd. • Huawei Machine Co., Ltd. • Huawei Marine • Huawei North America • Huawei Software Technologies, Co., Ltd. • Huawei Symantec Technologies Co., Ltd. • Huawei Tech Investment Co., Ltd. • Huawei Technical Service Co. Ltd. • Huawei Technologies Cooperative U.A. • Huawei Technologies Germany GmbH • Huawei Technologies Japan K.K. • Huawei Technologies South Africa Pty Ltd. • Huawei Technologies (Thailand) Co. • iSoftStone Technology Service Co., Ltd. • JV “Broadband Solutions” LLC • M4S N.V. • Proven Honor Capital Limited • PT Huawei Tech Investment • Shanghai Huawei Technologies Co., Ltd.
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • Openmoko Is Dead. Long Live Openphoenux!
    Openmoko is dead. Long live OpenPhoenux! Nikolaus Schaller, Lukas Märdian LinuxTag, Berlin, May 26th, 2012 Agenda Part one: some history Part two: a long way home Part three: rising from the ashes Part four: flying higher Part five: use it as daily phone – software Q&A Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 2 Some history – Past iterations • FIC GTA01 – Neo 1973 – Roughly 3.000 units sold – Production discontinued • Openmoko GTA02 – Neo Freerunner – Roughly 15.000 units sold – Hardware revision v7 – Production discontinued Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 3 Some history – The End (of part I) • FIC and Openmoko got out • Strong community continues development • Golden Delicious taking the lead – Excellent support for existing devices – Shipping spare parts and add-ons – Tuned GTA02v7++ • Deep sleep fix (aka bug #1024) -> Improved standby time • Bass rework -> Improved sound quality Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 4 Agenda Part one: some history Part two: a long way home Part three: rising from the ashes Part four: flying higher Part five: use it as daily phone – software Q&A Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 5 A long way home How do we get to a new open mobile phone? – open kernel for big ${BRAND} – reverse eng. – order from some ${MANUFACTURER} – hope for openness – DIY, “Use the source, Luke!” Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 6 Using the source: Beagleboard Beagleboard – Full Linux support – Open schematics – Open layout – Expansion connectors – Lots of documentation – Components available Nikolaus Schaller, Lukas Märdian OpenPhoenux | GTA04 May 26th 2012 LinuxTag 2012 wiki.openmoko.org | www.gta04.org 7 In theory it could fit (Aug.
    [Show full text]
  • An Analysis of Power Consumption in a Smartphone
    An Analysis of Power Consumption in a Smartphone Josh Hildebrand Introduction l Mobile devices derive the energy required to operate from batteries that are limited by the size of the device. l The ability to manage energy usage requires a good understanding of where and how the energy is being used. l The advancing functionality of modern smartphones is increasing the pressure on battery lifetime, and increases the need for effective energy management. l Goal is to break down a modern smartphone and measure the power consumption of the devices major subsystems, under a range of usage scenarios. l Results from the breakdown of energy consumption will be validated against two additional mobile devices. l Finally, an analysis of the energy consumption will be performed, and an energy model will be created to allow us to model usage patterns. Methodology / Device Under Test l The approach is to take physical power measurements at the component level on a piece of real hardware. l Three elements to the experimental setup, the device under test, a hardware data acquisition (DAQ) system, and a host computer. l Device under test is the Openmoko Neo Freerunner 2.5G smartphone. Experimental Setup l To measure power to each component, supply voltage and current must be measured. l Current is measured by placing sense resistors on the power supply rails of each component. Resistors were selected such that the voltage drop did not exceed 10mV, less than 1% of the supply voltage. l Voltages were measured using a National Instruments PCI-6229 DAQ. Software l The device was running the Freerunner port of Android 1.5, using the Linux v2.6.29 kernel.
    [Show full text]
  • A Survey Onmobile Operating System and Mobile Networks
    A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS Vignesh Kumar K1, Nagarajan R2 (1Departmen of Computer Science, PhD Research Scholar, Sri Ramakrishna College of Arts And Science, India) (2Department of Computer Science, Assistant Professor, Sri Ramakrishna College Of Arts And Science, India) ABSTRACT The use of smartphones is growing at an unprecedented rate and is projected to soon passlaptops as consumers’ mobile platform of choice. The proliferation of these devices hascreated new opportunities for mobile researchers; however, when faced with hundreds ofdevices across nearly a dozen development platforms, selecting the ideal platform is often met with unanswered questions. This paper considers desirable characteristics of mobileplatforms necessary for mobile networks research. Key words:smart phones,platforms, mobile networks,mobileplatforms. I.INTRODUCTION In a mobile network, position of MNs has been changing due todynamic nature. The dynamic movements of MNs are tracked regularlyby MM. To meet the QoS in mobile networks, the various issuesconsidered such as MM, handoff methods, call dropping, call blockingmethods, network throughput, routing overhead and PDR are discussed. In this paper I analyse the five most popular smartphone platforms: Android (Linux), BlackBerry, IPhone, Symbian, and Windows Mobile. Each has its own set of strengths and weaknesses; some platforms trade off security for openness, code portability for stability, and limit APIs for robustness. This analysis focuses on the APIs that platforms expose to applications; however in practice, smartphones are manufactured with different physical functionality. Therefore certain platform APIs may not be available on all smartphones. II.MOBILITY MANAGEMENT IP mobility management protocols proposed by Alnasouri et al (2007), Dell'Uomo and Scarrone (2002) and He and Cheng (2011) are compared in terms of handoff latency and packet loss during HM.
    [Show full text]
  • Undersampled Pulse Width Modulation for Optical Camera Communications
    Undersampled Pulse Width Modulation for Optical Camera Communications Pengfei Luo1, Tong Jiang1, Paul Anthony Haigh2, Zabih Ghassemlooy3,3a, Stanislav Zvanovec4 1Research Department of HiSilicon, Huawei Technologies Co., Ltd, Beijing, China E-mail: {oliver.luo, toni.jiang}@hisilicon.com 2Department of Electronic and Electrical Engineering, University College London, London, UK Email: [email protected] 3Optical Communications Research Group, NCRLab, Faculty of Engineering and Environment, Northumbria University, Newcastle-upon-Tyne, UK 3aQIEM, Haixi Institutes, Chinese Academy of Sciences, Quanzhou, China Email: [email protected] 4Department of Electromagnetic Field, Faculty of Electrical Engineering, Czech Technical University in Prague, 2 Technicka, 16627 Prague, Czech Republic Email: [email protected] Abstract—An undersampled pulse width modulation (UPWM) According to the Nyquist sampling theorem, if these FRs are scheme is proposed to enable users to establish a non-flickering adopted for sampling, the transmitted symbol rate Rs must be optical camera communications (OCC) link. With UPWM, only a lower than half the sampling rate. However, this will clearly digital light emitting diode (LED) driver is needed to send signals lead to light flickering due to the response time of the human using a higher order modulation. Similar to other undersample- eye. Therefore, a number of techniques have been proposed to based modulation schemes for OCC, a dedicated preamble is support non-flickering OCC using low speed cameras (e.g., ≤ required to assist the receiver to indicate the phase error 60 fps). More precisely, there are three main modulation introduced during the undersampling process, and to compensate categories for LFR-based OCC using both global shutter (GS) for nonlinear distortion caused by the in-built gamma correction and rolling shutter (RS) digital cameras: i) display-based [3], ii) function of the camera.
    [Show full text]
  • Hi3519a V100 4K Smart IP Camera Soc Breif Data Sheet
    Hi3519A V100 4K Smart IP Camera SoC Breif Data Sheet Issue 02 Date 2018-06-20 Copyright © HiSilicon Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of HiSilicon Technologies Co., Ltd. Trademarks and Permissions , , and other HiSilicon icons are trademarks of HiSilicon Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between HiSilicon and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. HiSilicon Technologies Co., Ltd. Address: New R&D Center, Wuhe Road, Bantian, Longgang District, Shenzhen 518129 P. R. China Website: http://www.hisilicon.com Email: [email protected] HiSilicon Proprietary and Confidential Issue 02 (2018-06-20) 1 Copyright © HiSilicon Technologies Co., Ltd. Hi3519A V100 Hi3519A V100 4K Smart IP Camera SoC Introduction Key Features Hi3519A V100 is a high-performance and low-power 4K Low Power Smart IP Camera SoC designed for IP cameras, action cameras, 1.9 W power consumption in a typical scenario for 4K x panoramic cameras, rear view mirrors, and UAVs.
    [Show full text]
  • Analyzing Android GNSS Raw Measurements Flags Detection
    Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Environment Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet To cite this version: Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Envi- ronment. ICL-GNSS 2020 International Conference on Localization and GNSS, Jun 2020, Tampere, Finland. pp.1-6, 10.1109/ICL-GNSS49876.2020.9115564. hal-02870213 HAL Id: hal-02870213 https://hal-enac.archives-ouvertes.fr/hal-02870213 Submitted on 17 Jun 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Environment Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet To cite this version: Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms
    [Show full text]
  • Hi3798m V200 Brief Data Sheet
    Hi3798M V200 Hi3798M V200 Brief Data Sheet Key Specifications Processor Security Processing Multi-core 64-bit high-performance ARM Cortex Advanced CA and downloadable CA A53 DRM Multi-core high-performance GPU Secure boot, secure storage, and secure upgrade Memory Control Interfaces Graphics and Display Processing (Imprex 2.0 DDR3/4 interface Processing Engine) eMMC/NOR/NAND flash interface Multiple HDR formats Video Decoding (HiVXE 2.0 Processing Engine) 3D video processing and display Maximum 4K x 2K@60 fps 10-bit decoding 2D graphics acceleration engine Multiple decoding formats, including Audio and Video Interfaces H.265/HEVC, AVS, H.264/AVC MVC, MPEG-1/2/4, VC-1, and so on HDMI 2.0b output Analog video interface Image Decoding Digital and analog audio interfaces Full HD JPEG and PNG hardware decoding Peripheral Interfaces Video and Image Encoding GE and FE network ports 1080p@30 fps video encoding Multiple USB ports Audio Encoding and Decoding SDIO, UART, SCI, IR, KeyLED, and I2C interfaces Audio decoding in multiple formats Audio encoding in multiple formats Others DVB Interface Ultra-low-power design with less than 30 mW standby power consumption Multi-channel TS inputs and outputs BGA package Solution Is targeted for the DVB/Hybrid STB market. Complies with the broadcasting television-level Supports full 4K decoding. picture quality standards. Supports Linux, Android, and TVOS intelligent Metes the increasing value-added service operating systems requirements. Copyright © HiSilicon (Shanghai) Technologies
    [Show full text]
  • Hi3559a V100 Ultra-HD Mobile Camera Soc Breif Data Sheet
    Hi3559A V100 ultra-HD Mobile Camera SoC Brief Data Sheet Issue 01 Date 2017-10-30 Copyright © HiSilicon Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of HiSilicon Technologies Co., Ltd. Trademarks and Permissions , , and other HiSilicon icons are trademarks of HiSilicon Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between HiSilicon and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. HiSilicon Technologies Co., Ltd. Address: New R&D Center, Wuhe Road, Bantian, Longgang District, Shenzhen 518129 P. R. China Website: http://www.hisilicon.com Email: [email protected] Hi3559A V100 Hi3559A V100 Ultra-HD Mobile Camera SoC Brief Data Sheet Introduction Key Features Hi3559A V100 is a professional 8K ultra-HD mobile Low Power Consumption camera SoC. It supports 8K30/4K120 digital video recording Typical power consumption of 3 W in 8KP30 (7680 x with broadcast-level picture quality.
    [Show full text]