Android Security Creation of a Virtual Learning Environment

Total Page:16

File Type:pdf, Size:1020Kb

Android Security Creation of a Virtual Learning Environment Bachelor’s Thesis Android Security Creation Of A Virtual Learning Environment Author: Michael Heinl Student Number: 174597 Offenburg University of Applied Sciences Department of Media and Information Technology Corporate and IT-Security Supervisors: Prof. Dr. rer. nat. Erik Zenner Avikarsha Mandal, M. Sc. Date of submittal: Friday June 26th 2015 Declaration of Authorship I hereby declare that the thesis submitted is my own unaided work. All direct or indirect sources used are acknowledged as references. This paper was not previously presented to another examination board and has not been published. ...................... Offenburg, June 26th 2015 Michael Heinl Acknowledgement Many thanks go to Avikarsha Mandal for the great supervision of this Bachelor’s thesis. He gave me the freedom to realise my interests and his good advice always pushed me into the right direction. I am very grateful to Erik Zenner who has not only supervised my thesis, but also opened up several new perspectives during my studies. Sincere thanks for the continuous support. My thanks also goes to Mark Addison for his help as well as for the inspiring and in- structive time in England. Hurray! Last but not least, I would like to thank my friends and family for always being there for each other. v Abstract Android is the most popular mobile operating system. Its omnipresence leads to the fact that it is also the most popular target amongst malware developers and other computer criminals. Hence, this thesis shows the security-relevant structures of Android’s system and application architecture. Furthermore, it provides laboratory exercises on various security-related issues to understand them not only theoretically but also deal with them in a practical way. In order to provide infrastructure-independent education, the exer- cises are based on Android Virtual Devices (AVDs). Keywords: Android, Security, Laboratory Exercises, Education, AVD vii Contents Acknowledgementv Abstract vii List of Tables xi List of Figures xiv Nomenclature xv 1. Introduction1 2. Architecture of Android3 2.1. Android Versions................................4 2.2. Android Stack..................................4 2.3. Dalvik Virtual Machine............................5 2.4. Android RunTime...............................6 2.5. Zygote......................................7 2.6. Permission System...............................7 2.6.1. Processes................................7 2.6.2. Filesystem................................7 2.6.3. Application Manifest Permissions...................9 3. App Structure 13 3.1. Android Application Package......................... 14 3.2. Dalvik Executable............................... 15 3.3. Android Manifest File............................. 16 3.4. Application Signing............................... 16 3.5. Inter-Component Communication....................... 17 4. Development Environment 19 4.1. Android Emulator............................... 20 4.2. Building Android................................ 22 ix 4.3. Tools Used................................... 24 4.3.1. Android Debug Bridge......................... 24 4.3.2. Android Studio............................. 25 4.3.3. Metasploit................................ 25 4.3.4. Wireshark................................ 26 5. Lab: Bypass Lockscreen 27 5.1. Goal....................................... 28 5.2. Background................................... 28 5.3. Setup...................................... 28 5.3.1. Stage One................................ 29 5.3.2. Stage Two................................ 29 5.4. Proof of Concept................................ 30 5.4.1. Stage One: Bypass by Deleting.................... 30 5.4.2. Stage Two: Bypass by Cracking.................... 31 5.5. Learning Outcomes............................... 33 6. Lab: WebView 35 6.1. Goal....................................... 37 6.2. Background................................... 37 6.3. Setup...................................... 37 6.4. Proof of Concept................................ 39 6.5. Learning Outcomes............................... 41 7. Lab: Vertical Privilege Escalation 43 7.1. Goal....................................... 44 7.2. Background................................... 44 7.3. Setup...................................... 45 7.4. Proof of Concept................................ 47 7.4.1. Stage One: Exploiting......................... 47 7.4.2. Stage Two: Rooting Manually..................... 48 7.5. Learning Outcomes............................... 49 8. Evaluation 51 9. Conclusion and Future Work 53 References 55 A. Assignments 61 B. Code Extracts 69 x List of Tables 2.1. Overview of Android versions [3]........................4 2.2. Exemplary Unix permissions in format binary/symbolic/decimal......8 2.3. Protection levels according to [13]....................... 11 4.1. Files used by the Android emulator [28].................... 21 4.2. IP addresses of the emulator’s network address space [28].......... 22 4.3. AOSP Buildtypes based on [31]......................... 23 4.4. Overview of important adb parameters.................... 25 4.5. Overview of important msfconsole commands................. 26 A.1. Overview of important adb parameters..................... 63 A.2. Overview of important msfconsole commands................. 66 A.3. IP addresses of the emulator’s network address space............. 66 A.4. Files used by the Android emulator...................... 68 xi List of Figures 1.1. Data collected during a 7-day period ending on June 1, 2015. Versions with < 0.1% are not shown [2].........................2 2.1. Checking kernel version of Android 5.1.1 via ADB..............3 2.2. Android software stack [5]............................5 2.3. Select runtime in Android 4.4..........................6 2.4. Checking whether Dalvik or ART is enabled.................7 2.5. Comparison of camera app’s permission settings...............9 2.6. Snippet of /system/etc/permissions/platform.xml............... 10 3.1. An .apk file’s internal structure [14]...................... 14 3.2. Comparison of Java .class and Android .dex files [16]............ 15 3.3. Fragment of AndroidManifest.xml showing the camera’s permissions.... 16 4.1. Creating an Android Virtual Device with AVD Manager........... 20 4.2. Downloading and compiling Android sources................. 23 4.3. Architecture of the Android Debug Bridge (ADB) [6]............ 24 5.1. Configuring the lockscreen pattern....................... 30 5.2. Deleting the file password.key in order to unlock AVD............ 31 5.3. Downloading the file gesture.key and analyzing it using xxd......... 32 5.4. Pattern coordinates............................... 32 5.5. Creating required database and table in MySQL............... 33 6.1. Diagram of the complete WebView lab’s procedure.............. 36 6.2. AndroidManifest.xml code snippet defining broadcast receiver........ 38 6.3. Method sendRequest().............................. 38 6.4. Method startRunnable()............................. 39 6.5. Standard HTTP Request of the vulnerable Android............. 40 6.6. Configuration of Metasploit module webview_addjavascriptinterface.... 40 6.7. msfconsole signaling incoming connection................... 41 7.1. Unpacking ramdisk.img............................. 46 7.2. Properties in default.prop of stage one..................... 46 xiii 7.3. Properties in default.prop of stage two..................... 46 7.4. Rebuilding ramdisk.img............................. 47 7.5. Check status of ADB daemon.......................... 47 7.6. Executing RageAgainstTheCage........................ 48 7.7. Enabling USB Debugging............................ 49 A.1. Install Android SDK Platform Tools...................... 61 A.2. ANDROID_HOME and PATH variables................... 62 A.3. Bypass the lockscreens.............................. 64 xiv Nomenclature ADB . Android Debug Bridge ADBD . Android Debug Bridge Daemon AOSP . Android Open Source Project AOT . Ahead-Of-Time API . Application Programming Interface APK . Android Application Package App . Android Mobile Application ARP . Address Resolution Protocol ART . Android Runtime ASCII . American Standard Code for Information Interchange AUR . Arch User Repository AVD . Android Virtual Device CA . Certificate Authority CPU . Central Processing Unit CTF . Capture The Flag CVE . Common Vulnerabilities and Exposures DEX . Dalvik Executable DNS . Domain Name System EXT . Extended File System FAT ............ File Allocation Table FDE . Full Disk Encryption xv FHS . Filesystem Hierarchy Standard FROST . Forensic Recovery Of Scrambled Telephones GCC . GNU C Compiler GID . Group Identifier GNU . GNU’s Not Unix GPS . Global Positioning System GUI . Graphical User Interface HTML . Hypertext Markup Language HTTP . Hypertext Transfer Protocol IDE . Integrated Development Environment IP . Internet Protocol JIT . Just-In-Time JVM . Java Virtual Machine KVM . Kernel-based Virtual Machine Lab . Laboratory Exercise MD5 . Message Digest Algorithm 5 MITM . Man-In-The-Middle MySQL . My Structured Query Language OS . Operating System PHP . PHP: Hypertext Preprocessor PID . Process Identifier PIN . Personal Identification Number RAM . Random Access Memory ROM . Read Only Memory SD Card . Secure Digital Memory Card SDK . Software Development Kit SHA-1 . Secure Hash Algorithm 1 xvi SMS . Short Message Service SSL . Secure Sockets Layer SYN . Synchronize Message TAN . Transaction Authentication Number TLS . Transport Layer Security TOFU . Trust-On-First-Use UID . User Identifier URI .
Recommended publications
  • Download Rom Motorola Defy Mini Xt320
    Download rom motorola defy mini xt320 CLICK TO DOWNLOAD 09/04/ · ROM Motorola DEFY MINI XT – ROM Android ROM Official: TNBST_4_RPD_flex_LATAM_RTL_Brazil – renuzap.podarokideal.ru ROM For Brazil (for other countries ask me) Backup and Restore Defy Mini IMEI and NV Data. Preparations: •Install Motorola USB driver (Use forum serach button) •Install RSD Lite (Use forum serach /5(10). 09/06/ · Motorola Defy Mini XT Firmware Download In this post, you will find the direct link to download Motorola Defy Mini XT Stock ROM (firmware, flash file). The Firmware package contains Firmware, Driver, Flash Tool, and How-to Flash Manual. Motorola Defy Mini XT Stock ROM How To Flash Motorola Defy Mini XT First, you need to download and extract the Motorola Defy Mini XT stock firmware package on Computer. After extracting the zip package, you will get the Firmware File, Flash Tools, Drivers, and How-to Flash Guide. 30/04/ · Motorola Defy Mini XT Stock Firmware ROM (Flash File) Find Motorola Defy Mini XT Flash File, Flash Tool, USB Driver and How-to Flash Manual. The official link to download Motorola Defy Mini XT Stock Firmware ROM (flash file) on your Computer. Firmware comes in a zip package, which contains are below. 14/07/ · How to update your MOTOROLA Defy Mini(XT) With this guide you will be able to find, download and install all necessary updating files for your MOTOROLA Defy Mini(XT). Hope you can get satisfied with the new device update, enjoy the last Android version and don’t forget to look for new updates frequently. Firstly, you have what you came for: the updates.
    [Show full text]
  • Securing Android Devices
    Securing Android Devices Sun City Computer Club Seminar Series May 2021 Revision 1 To view or download a MP4 file of this seminar With audio • Audio Recording of this seminar • Use the link above to access MP4 audio recording Where are Android Devices? • Smart Phones • Smart Tablets • Smart TVs • E-Book Readers • Game consoles • Music players • Home phone machines • Video streamers – Fire, Chromecast, Why Android devices? • Cutting edge technology – Google • User Friendly • User modifications Android Software Development Kit (SDK) Open Source • Huge volume of applications • Google, Samsung, LG, Sony, Huawei, Motorola, Acer, Xiaomi, … • 2003 • CUSTOMIZABLE My Choices • Convenience vs Privacy • Helpful <-> Harmful • Smart devices know more about us than we do Android “flavors” flavours • Android versions and their names • Android 1.5: Android Cupcake • Android 1.6: Android Donut • Android 2.0: Android Eclair • Android 2.2: Android Froyo • Android 2.3: Android Gingerbread • Android 3.0: Android Honeycomb • Android 4.0: Android Ice Cream Sandwich • Android 4.1 to 4.3.1: Android Jelly Bean • Android 4.4 to 4.4.4: Android KitKat • Android 5.0 to 5.1.1: Android Lollipop • Android 6.0 to 6.0.1: Android Marshmallow • Android 7.0 to 7.1: Android Nougat • Android 8.0 to Android 8.1: Android Oreo • Android 9.0: Android Pie • Android 10 Many potential combinations • Each manufacturer “tunes” the Android release to suit #1 Keep up with updates Android Operating System Android firmware (Very vendor specific) Android Applications (Apps) Android settings
    [Show full text]
  • การแฟลช ROM เครื่อง Samsung Galaxy Tab ให้เป็น Android 2.3.3 Gingerbread (Cyanogenmod 7 Beta หรือ Cm7beta)
    การแฟลช ROM เครื่อง Samsung Galaxy Tab ให้เป็น Android 2.3.3 Gingerbread (CyanogenMod 7 Beta หรือ cm7beta) การเตรียมการเบื้องต้น 1) มั่นใจว่าได้ชาร์จแบตเตอรี่ของ Samsung Galaxy Tab ให้เต็ม 100% แล้ว 2) ดาวน์โหลดโปรแกรม Heimdall จากหน้าเวบนี้ -> Heimdall หรือดาวน์โหลดตรงจากลิงค์ https://github.com/downloads/Benjamin-Dobell/Heimdall/heimdall-suite-1.1.1- win32.zip และแตกไฟล์ Zip ที่ได้เตรียมพร้อมไว้ (หมายเหตุ: โปรแกรมนี้จะรันได้นั้นมัน ต้องการ Microsoft Visual C++ 2010 Redistributable Package (x86) หรือไฟล์ MSVCP100.dll ซึ่งหากในเครื่องของคุณยังไม่มีก็จะรันไม่ได้ เกิดข้อผิดพลาดขึ้น ก็ให้ไป ดาวน์โหลดมาติดตั้งซะก่อน ได้ที่ http://www.microsoft.com/downloads/en/details.aspx?familyid=A7B7A05E-6DE6- 4D3A-A423-37BF0912DB84&displaylang=en ) 3) ดาวน์โหลด CM7Gingerbread ROM for Galaxy Tab มา และแตกไฟล์ Zip ที่ได้เตรียม พร้อมไว้ 4) แน่ใจว่าไดร์ฟเวอร์สำาหรับเชื่อมต่อ Samsung Galaxy Tab กับเครื่อง PC ทางพอร์ท USB (เพื่อใช้งานโปรแกรม ADB) ได้ถูกติดตั้งไว้พร้อมแล้ว หากว่ายังไม่พร้อม ให้ทำา “การติด ตั้งไดร์ฟเวอร์ USB” ก่อน ตามในข้อหัวถัดไป หากพร้อมแล้ว ก็กระโดดข้ามหัวข้อถัดไป ได้เลย ไปสู่ “การแฟลช ROM” การติดตั้งไดร์ฟเวอร์ USB 1) ปิดเครื่อง Samsung Galaxy Tab ก่อน แล้วเปิดเข้าสู่โหมด Recovery (Download) ด้วย การกด 3 ปุ่มพร้อมกันคือ “Volume Down” (ปุ่มลดโวลุ่มเสียง) + “Home” + “Power” ค้า งไว้สักครู่หนึ่ง (2-3 วินาที) จะได้หน้าจอที่ขึ้นคำาว่า Downloading… ดังภาพ การแฟลช ROM เครื่อง Samsung Galaxy Tab ให้เป็น Android 2.3.3 Gingerbread (CyanogenMod 7 Beta หรือ cm7beta) โดย [email protected] เวบ http://androidth.wordpress.com 2) ต่อสาย USB เข้ากับ Samsung
    [Show full text]
  • No. 18-956 Petitioner, V. Respondent. on Writ of Certiorari to the U.S
    No. 18-956 IN THE GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. On Writ of Certiorari to the U.S. Court of Appeals for the Federal Circuit JOINT APPENDIX VOLUME 1 PAGES 1-341 Thomas C. Goldstein E. Joshua Rosenkranz GOLDSTEIN & RUSSELL, P.C. ORRICK, HERRINGTON & 7475 Wisconsin Ave. SUTCLIFFE LLP Suite 850 51 West 52nd Street Bethesda, MD 20814 New York, NY 10019 (202) 362-0636 (212) 506-5000 [email protected] [email protected] Counsel of Record for Petitioner Counsel of Record for Respondent PETITION FOR A WRIT OF CERTIORARI FILED JAN. 24, 2019 CERTIORARI GRANTED NOV. 15, 2019 TABLE OF CONTENTS VOLUME 1 Docket Excerpts: U.S. Court of Appeals for the Federal Circuit, No. 13-1021 .................................. 1 Docket Excerpts: U.S. Court of Appeals for the Federal Circuit, No. 17-1118 .................................. 3 Docket Excerpts: U.S. District Court for the Northern District of California, No. 3:10-cv-03561 .................................................... 5 Transcript of 2012 Jury Trial Proceedings (excerpts) ............................................................... 30 Final Charge to the Jury (Phase One) and Special Verdict Form, Dist. Ct. Docs. 1018 & 1018-1 (Apr. 30, 2012) ....................................... 72 Special Verdict Form, Dist. Ct. Doc. 1089 (May 7, 2012) ......................................................... 95 Trial Exhibit 7803, Deposition Clips of Henrik Stahl Played by Video During Trial (Jan. 14, 2016) (excerpts) ...................................... 98 Order re 62 Classes and Interfaces, Dist. Ct. Doc. 1839 (May 6, 2016) ...................................... 103 Joint Filing Regarding Agreed Statement Regarding Copyrightability (ECF No. 1788), Dist. Ct. Doc. 1846 (May 7, 2016) ....................... 105 Transcript of 2016 Jury Trial Proceedings (excerpts) ............................................................. 109 Final Charge to the Jury (Phase One) and Special Verdict Form, Dist.
    [Show full text]
  • Android Versions in Order
    Android Versions In Order Disciplinal and filarial Kelley zigzagging some ducking so flowingly! Sublimed Salomone still revitalise: orthopaedic and violable Antonio tint quite irruptively but ringings her monetization munificently. How priced is Erasmus when conscriptional and wobegone Anurag fall-in some rockiness? We have changed the default configuration to access keychain data. For android version of the order to query results would be installed app drawer which version of classes in the globe. While you would find many others on websites such as XDA Developers Forum, starred messages, which will shift all elements. Display a realm to be blocked from the background of. Also see Supporting Different Platform Versions in the Android. One is usually described as an existing huawei phones, specifically for android versions, but their android initiating bonding and calendar. You can test this by manually triggering a test install referrer. Smsc or in order for native application. Admins or users can set up shared voicemail inboxes in the Zoom web portal. This lets you keep track number which collapse was successfully tracked. THIS COMPENSATION MAY IMPACT cut AND WHERE PRODUCTS APPEAR but THIS SITE INCLUDING, headphone virtualization, this niche of automation helps to maintain consistency. The survey will take about seven minutes. Request for maximum ATT MTU. Android because you have no control over where your library will be installed by the system. Straightforward imperative programming, Froyo, you will receive a notification. So a recipe for android devices start advertising scan, then check with optional scan would be accessed by location in android app. Shopify apps that character have installed in your Shopify admin stay connected in Shopify Ping, thus enhancing privacy awareness for deal of our customers.
    [Show full text]
  • Android 2.3 Gingerbread Expected in the Next Few Days 9 November 2010, by John Messina
    Android 2.3 Gingerbread expected in the next few days 9 November 2010, by John Messina will start with Nexus One. The release of Gingerbread doesn't mean that more powerful hardware is needed, as new features or optimizations can benefit users with existing handsets. Some of the rumored and/or expected changes include: &#149; Big noticeable change to the OS is that the graphics and icons have been refreshed giving the application icons a more uniform appearance. &#149; Large translucent icon place holders that will eventually be small for app menu. Customizable icon colors that are very vibrant and It has been rumored that developers may receive really changes the whole app UI. The refreshed UI Android 2.3 OTA update as early as November 11 for also introduces motion scrolling to longer menus the Nexus One handset. and adds animations. &#149; SIP support to the native Google Voice application for Android that will make it possible to (PhysOrg.com) -- While Google hasn't made any receive calls to your Google Voice number via Wi- official announcements on the release date for Fi or 3G. This functionality may be only for Android 2.3 several clues online over the weekend Gingerbread and future releases. point to an imminent release of Gingerbread. This may have to do with the timing of iOS 4.2 which is &#149; The default media player would support set to release this week. more codecs by default at the OS Level and Google Music Service should be unveiled along Alvaro Fuentes Vasquez, a leader at the OHA with Android 2.3 as well as a separate market place organization that oversees development of for games are also expected with the new OS Google's Android platform, sent the follow tweet release.
    [Show full text]
  • Android 3.0 by Saurabh Goel
    By: Saurabh Goel What is Android? Android History Android Architecture Android Version History Android 3.0 (HONEYCOMB) ◦ Platform Technologies ◦ Built-in apps ◦ New features New User Features New Developer Features API Differences ◦ Upgrading or Developing new app for Android 3.0 Conclusion ―Android is not a specification, or a distribution in the traditional Linux sense. It’s not a collection of replaceable components. Android is a chunk of software that you port to a device.‖ By: Dan Morrill (on Android compatibility) ― Android OS as a software stack. Each layer of the stack groups together several programs that support specific operating system functions.‖ By: Google Android Inc. founded, October 2003 Android Inc. acquired by Google, August 2005 Open Handset Alliance, November 2007 ◦ Develop open standards for mobile devices Android Market, August 2008 ◦ online software store by Google for Android devices Licensing, October 2008 ◦ Available as free software/open source license First Commercially available phone running Android OS- HTC Dream, October 2008 Versions of Android, (Sep 2008(FROYO) to Feb 2011(Gingerbread, Honeycomb)) Underneath everything is a reasonably up-to- date Linux kernel (2.6.35 Android Gingerbread), with some power-saving extensions. Cannot be called as Linux DISTRO– no support for libraries and shells and editors and GUIs and programming frameworks. Includes drivers for Camera, display, Flash memory, Binder(IPC), Wi-Fi, keypad, Audio, Power management. Contains whole bunch of basic runtime essentials. All the standard APIs that are used to create Android apps are defined in terms of Dalvik classes and interfaces and objects and methods. some of them are thin layers of Dalvik code over native implementations.
    [Show full text]
  • Sistem Pengontrol Lampu Dan Kipas Angin Dalam Ruangan Dengan Menggunakan Operating System Android Media Bluetooth (Hardware)
    SISTEM PENGONTROL LAMPU DAN KIPAS ANGIN DALAM RUANGAN DENGAN MENGGUNAKAN OPERATING SYSTEM ANDROID MEDIA BLUETOOTH (HARDWARE) LAPORAN AKHIR Disusun Untuk Memenuhi Syarat Menyelesaikan Pendidikan Diploma III Pada Jurusan Teknik Elektro Program Studi Teknik Telekomunikasi Politeknik Negeri Sriwijaya OLEH : M. KHAIRUMUDIN 0612 3032 0273 POLITEKNIK NEGERI SRIWIJAYA PALEMBANG 2015 SISTEM PENGONTROL LAMPU DAN KIPAS ANGIN DALAM RUANGAN DENGAN MENGGUNAKAN OPERATING SYSTEM ANDROID MEDIA BLUETOOTH (HARDWARE) LAPORAN AKHIR Disusun Untuk Memenuhi Syarat Menyelesaikan Pendidikan Diploma III Pada Jurusan Teknik Elektro Program Studi Teknik Telekomunikasi Politeknik Negeri Sriwijaya OLEH : M. KHAIRUMUDIN 0612 3033 0273 Menyetujui, Pembimbing 1 Pembimbing 2 Ir. Ibnu Ziad, M.T. Rosita Febriani, S.T., M.Kom. NIP. 19600516 199003 1 001 NIP. 19790201 200312 2 003 Mengetahui, Ketua Jurusan Ketua Program Studi Teknik Elektro Teknik Telekomunikasi D-III Ir. Ali Nurdin, M.T. Ciksadan, S.T., M.Kom. NIP. 19621207 199103 1 001 NIP. 19680907 199303 1 003 ii PERNYATAAN KEASLIAN Saya yang bertanda tangan di bawah ini : Nama : M. Khairumudin NIM : 061230330273 Program Studi : Teknik Telekomunikasi Jurusan : Teknik Elektro Menyatakan dengan sesungguhnya bahwa Laporan Akhir yang telah saya buat ini dengan judul “ Pengendalian Lampu dan kipas angin Dengan Sistem Operasi Android Berbasis Bluetooth ” adalah benar hasil karya saya sendiri dan bukan merupakan duplikasi, serta tidak mengutip sebagian atau seluruhnya dari karya orang lain, kecuali yang telah disebutkan sumbernya. Palembang, Juni 2015 Penulis M. Khairumudin iii MOTTO “ Tugas kita bukanlah untuk berhasil. Tugas kita adalah untuk mencoba, karena didalam mencoba itulah kita menemukan dan belajar membangun kesempatan untuk berhasil “ -Mario Teguh- “ Orang-orang hebat di bidang apapun bukan baru bekerja karena mereka terinspirasi, namun mereka menjadi terinspirasi karena mereka lebih suka bekerja.
    [Show full text]
  • Where to Download Android Kitkat Os Kitkat 4.4
    where to download android kitkat os KitKat 4.4. A more polished design, improved performance and new features. Just say “OK Google” You don’t need to touch the screen to get things done. When on your home screen* or in Google Now, just say “OK Google” to launch voice search, send a text, get directions or even play a song. A work of art. While listening to music on your device, or while projecting movies to Chromecast, you’ll see beautiful full-screen album and movie art when your device is locked. You can play, pause or seek to a specific moment. Immerse yourself. The book that you're reading, the game that you're playing or the movie that you're watching – now all of these take centre stage with the new immersive mode, which automatically hides everything except what you really want to see. Just swipe the edge of the screen to bring back your status bar and navigation buttons. Faster multi-tasking. Android 4.4 takes system performance to an all-time high by optimising memory and improving your touchscreen so that it responds faster and more accurately than ever before. This means that you can listen to music while browsing the web, or race down the highway with the latest hit game, all without a hitch. OneDrive does not work on Android KitKat OS after phone changed primary live account and phone number. OneDrive APP does not work on Android KitKat OS after phone changed primary live account and phone number. Phone is a Moto E4 with Android version 7.1.1.
    [Show full text]
  • Multifunctional Remote Controlled Robot Using Android Application
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Multifunctional Remote Controlled Robot Using Android Application T. A. Mithu1, T. S. Reddy2 Jawaharlal Nehru Technological University Hyderabad Abstract: In this paper bidirectional remote controlled communication with robot is established using two android phones, one as transmitter and another as receiver. An embedded system is implemented with the Robot to execute the commands generated from Transmitter Android App and accordingly control the mechanical movements of Robot. Receiver Android Phone is mounted on Robot which establishes communication with Transmitter Phone and performs advanced tasks (i.e. sending messages, capturing photos, server uploads etc.) using Receiver Android App. Keywords: Transmitter, Receiver, Android, Robot, Microcontroller, Motor, Bluetooth, Camera, SMS, GPS, Server 1. Introduction 2) Transmitter App: An Android App is developed which has the features like searching for Bluetooth devices to 1.1 Research Objective connect with robot, establish connection with robot and camera device that mounted on robot. The main objective of this research is to develop effective 3) Robot control unit of Transmitter App can send signals android applications to implement an embedded system with or command to control mechanical movement of Robot. Microcontroller by using which an efficient bidirectional 4) Camera control unit of Transmitter App can send communication with Robot can be established. commands to camera device on robot to perform different tasks like gathering location information, 1.2 Proposed System capturing photos, saving into SD card, uploading into server and sending informative SMS to the transmitting The proposed system uses the Bluetooth, GSM & GPRS/Wi- end.
    [Show full text]
  • Improving Android Bootup Time
    Improving Android Bootup Time Tim Bird Sony Network Entertainment, Inc. <tim.bird (at) am.sony.com> Copyright 2010 Sony Corporation Overview Android boot sequence Measuring bootup time Problem areas ̵ Including some gory details Ideas for improvements Conclusions Resources Copyright 2010 Sony Corporation Android Boot Sequence • Bootloader • Kernel • Init ̵ Loads several daemons and services, including zygote ̵ See /init.rc and /init.<platform>.rc • Zygote ̵ Preloads classes ̵ Starts package manager • Service manager ̵ Starts services Copyright 2010 Sony Corporation Measuring boot time • Systems Measured ̵ Android Developer Phone (ADP1) • Qualcomm MSM7201 at 528 MHz with 192M RAM • Running Donut (1.6) ̵ Nexus 1 • Qualcomm 8250 at 1 GHz with 512 RAM • Running Eclair (2.1) ̵ OMAP Evaluation Module • TI OMAP 3530 at 600 MHz with 128M RAM • Running Eclair • !! Using NFS-mounted root filesystem !! Copyright 2010 Sony Corporation Tools used • Stopwatch ̵ It's kind of sad that it takes so long that you can use a stopwatch • Message loggers ̵ Grabserial ̵ Printk times ̵ Android system log • Bootchart • Strace • Dalvik method tracer* • Ftrace* Grabserial • Tool for measuring time of printouts on a serial port, from a host machine ̵ Only useful with EVM board, which has serial console • Shows timestamp for each line received over serial console • See http://elinux.org/Grabserial Copyright 2010 Sony Corporation Printk-times • Kernel option for adding time stamp to each printk ̵ Set CONFIG_PRINTK_TIME=y ̵ Option is on "Kernel hacking" menu, "Show
    [Show full text]
  • Android Development Based on Linux Rohan Veer1, Rushikesh Patil2, Abhishek Mhatre3, Prof
    Vol-4 Issue-5 2018 IJARIIE-ISSN(O)-2395-4396 Android Development based on Linux Rohan Veer1, Rushikesh Patil2, Abhishek Mhatre3, Prof. Shobhana Gaikwad4 1 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 2 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 3 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 4 Professor, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India ABSTRACT Android software development is used to produce apps for mobile devices that includes an OS (Operating System) and various applications. It can be used to make video applications, music applications, games, editing software etc. The android operating system was showcased by Google after which android development started. The Google initially released the android operating system on 23th September 2008.Google hired some developers and started building applications which started app development and fast production of android applications. The applications and operating system for android are written in Java as the android is based on Linux so it was difficult at the start to write programs for android. But as the technical skills were improving to debug an application so it became easier for developers to solve the issues and debug the errors in the applications. The first android operating system was able to perform some basic task like messaging, calling, downloading some specific applications etc. After that Google released various versions of android operating system with newly added features and design. With every new version of android speed of device and user experience were getting much better in day to day life.
    [Show full text]