scholarly journals Comparative analysis of approches in developing Android applications using Xamarin technology

2018 ◽  
Vol 9 ◽  
pp. 318-323
Author(s):  
Michał Bartkiewicz ◽  
Adrian Dziedzic

Article shows analysis of Xamarin technology in two modes: Xamarin Forms and Xamarin Native, used for developing applications for mobile devices with Android system. Comparison concerns the number of generated lines of code, performance of each part and size of installed application and size of apk installation file. Analysis was based on two identical applications created using both approaches. As a result of the analysis the more efficient approach for given purpose has been indicated.

Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2019 ◽  
Vol 13 ◽  
pp. 354-358
Author(s):  
Daniel Sulowski ◽  
Grzegorz Kozieł

This publication presents the results of a comparative analysis of Java and Kotlin programming languages used to create mobile applications for system Android. The analysis covers performance aspects such as CPU load, RAM load, as well as the compilation and execution times. Aspects such as code structure, availability of libraries, supported databases, popularity and community support were taken under consolidation.


2018 ◽  
Vol 9 ◽  
pp. 302-307
Author(s):  
Aleksandra Iwaniuk

Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn.


Web 2.0 applications are becoming ubiquitous applications (i.e., applications that can be accessed by anyone, anywhere, anytime, using any device). A key element of these ubiquitous applications is mobile devices. In fact, the involvement of mobile devices such as smartphones and tablet computers in the development of Web 2.0 applications has resulted in a new kind of Rich Internet Application (RIA) that can run on a variety of devices starting from the same code base, and it is known as multi-device RIA. The term multi-device RIA embraces not only mobile applications but also other kinds of out-of-browser applications such as cross-platform desktop applications as well as the traditional cross-browser Web applications. This chapter formalizes the concept of multi-device RIA, and then it presents an overview of the capabilities of several multi-device development frameworks. This review is finally summarized in a comparative analysis.


2021 ◽  
Vol 10 (82) ◽  

Ear training aims to ensure the development of individuals receiving music education. There are mobile applications which music students can do hearing studies. The aim of this research; it is determining the content of ear training applications that can be accessed on the internet and downloaded to mobile devices to make a comparative analysis. In the research, 11 mobile applications with 100 thousand or more users were analyzed in terms of Turkish support, courses and ear training studies. As a result of the analyzes made, it was determined that in some applications, interval, scale and chord subjects were explained. It is comprehended that theoretical studies such as setting up defining intervals, scales and chords are included in the applications where ear training are carried out.In some applications, interval, scale, chord vocalization and playing exercises are additionally included. In line with these results; it is suggested to develop a mobile application in which the topics are arranged according to a curriculum, the exercises support the lectures, and the Turkish support is included. Keywords: Music, ear training, mobile applications


2019 ◽  
Vol 11 (23) ◽  
pp. 6637
Author(s):  
Cheolmin Yeom ◽  
Yoojae Won

Due to people in companies use mobile devices to access corporate data, attackers targeting corporate data use vulnerabilities in mobile devices. Most vulnerabilities in applications are caused by the carelessness of developers, and confused deputy attacks and data leak attacks using inter-application vulnerabilities are possible. These vulnerabilities are difficult to find through the single-application diagnostic tool that is currently being studied. This paper proposes a process to automate the decompilation of all the applications on a user’s mobile device and a mechanism to find inter-application vulnerabilities. The mechanism generates a list and matrix, detailing the vulnerabilities in the mobile device. The proposed mechanism is validated through an experiment on an actual mobile device with four installed applications, and the results show that the mechanism can accurately capture all application risks as well as inter-application risks. Through this mechanism, users can expect to find the risks in their mobile devices in advance and prevent damage.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Hui Li ◽  
Xuesong Pan ◽  
Xinluo Wang ◽  
Haonan Feng ◽  
Chengjie Shi

We present a novel attack named “Authenticator Rebinding Attack,” which aims at the Fast IDentity Online (FIDO) Universal Authentication Framework (UAF) protocol implemented on mobile devices. The presented Authenticator Rebinding Attack rebinds the victim’s identity to the attacker’s authenticator rather than the victim’s authenticator being verified by the service in the UAF protocol, allowing the attacker to bypass the UAF protocol local authentication mechanism by imitating the victim to perform sensitive operations such as transfer and payment. The lack of effective authentication between entities in the implementations of the UAF protocol used in the actual system causes the vulnerability to the Authenticator Rebinding Attack. In this paper, we implement this attack on the Android platform and evaluate its implementability, where results show that the proposed attack is implementable in the actual system and Android applications using the UAF protocol are prone to such attack. We also discuss the possible countermeasures against the threats posed by Authenticator Rebinding Attack for different stakeholders implementing UAF on the Android platform.


Sign in / Sign up

Export Citation Format

Share Document