监控和审计移动操作系统

M. Cărăbaş, Costin Carabas, L. Gheorghe, Răzvan Deaconescu, N. Tapus
{"title":"监控和审计移动操作系统","authors":"M. Cărăbaş, Costin Carabas, L. Gheorghe, Răzvan Deaconescu, N. Tapus","doi":"10.1504/IJSSC.2016.076571","DOIUrl":null,"url":null,"abstract":"The popularity and usage of mobile devices have increased and therefore performance demands changed. An important aspect is represented by the whole system stability which has a big impact on general user experience. This paper proposes a solution for improving the implementation process and stability of operating systems for mobile devices. It presents penetration testing techniques, in order to discover security vulnerabilities. The focus will be on the process of finding the bugs, the exploration part, and the exploitation will only be mentioned to highlight the importance of the vulnerabilities. The second part of the paper consists of a system service which collects the error messages and sends them to a server in order to perform a triage. Received data is saved, processed and then useful information is exposed to developers.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Monitoring and auditing mobile operating systems\",\"authors\":\"M. Cărăbaş, Costin Carabas, L. Gheorghe, Răzvan Deaconescu, N. Tapus\",\"doi\":\"10.1504/IJSSC.2016.076571\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The popularity and usage of mobile devices have increased and therefore performance demands changed. An important aspect is represented by the whole system stability which has a big impact on general user experience. This paper proposes a solution for improving the implementation process and stability of operating systems for mobile devices. It presents penetration testing techniques, in order to discover security vulnerabilities. The focus will be on the process of finding the bugs, the exploration part, and the exploitation will only be mentioned to highlight the importance of the vulnerabilities. The second part of the paper consists of a system service which collects the error messages and sends them to a server in order to perform a triage. Received data is saved, processed and then useful information is exposed to developers.\",\"PeriodicalId\":43931,\"journal\":{\"name\":\"International Journal of Space-Based and Situated Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Space-Based and Situated Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJSSC.2016.076571\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Space-Based and Situated Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJSSC.2016.076571","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

移动设备的普及和使用已经增加,因此性能需求也发生了变化。一个重要的方面是整个系统的稳定性,它对一般用户体验有很大的影响。本文提出了一种改进移动设备操作系统实现过程和稳定性的解决方案。介绍了渗透测试技术,以发现安全漏洞。重点将放在发现漏洞的过程上,即探索部分,而提到利用漏洞只是为了强调漏洞的重要性。论文的第二部分包括一个系统服务,它收集错误消息并将它们发送到服务器以执行分类。接收到的数据被保存、处理,然后向开发人员公开有用的信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Monitoring and auditing mobile operating systems
The popularity and usage of mobile devices have increased and therefore performance demands changed. An important aspect is represented by the whole system stability which has a big impact on general user experience. This paper proposes a solution for improving the implementation process and stability of operating systems for mobile devices. It presents penetration testing techniques, in order to discover security vulnerabilities. The focus will be on the process of finding the bugs, the exploration part, and the exploitation will only be mentioned to highlight the importance of the vulnerabilities. The second part of the paper consists of a system service which collects the error messages and sends them to a server in order to perform a triage. Received data is saved, processed and then useful information is exposed to developers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Space-Based and Situated Computing
International Journal of Space-Based and Situated Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-
自引率
0.00%
发文量
0
期刊最新文献
A hierarchical outlier detection method for spare parts transaction A multi-tiered spare parts inventory forecasting system GPS availability prediction based on air-ground collaboration Inventory Optimization based on NSGA-III Algorithm Data privacy and anonymisation of simulated health-care dataset using the ARX open source tool
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1