Search
Skip to Search Results- 5Computing Science, Department of
- 4Graduate and Postdoctoral Studies (GPS), Faculty of
- 4Graduate and Postdoctoral Studies (GPS), Faculty of/Theses and Dissertations
- 3Computing Science, Department of/Journal Articles (Computing Science)
- 3Concordia University of Edmonton
- 2Computing Science, Department of/Conference Papers (Computing Science)
-
Spring 2017
With the rise of smartphones and the increasing impact of mobile applications on everyday life, mobile software engineering has become a popular research topic. A desired outcome of these research efforts is efficient application development with lower cost, but with high-quality software...
-
2018
Saborido, R., Khomh, F., Hindle, Abram, Alba, E.
On mobile phones, users and developers use apps official marketplaces serving as repositories of apps. The Google Play Store and Apple Store are the official marketplaces of Android and Apple products which offer more than a million apps. Although both repositories offer description of apps,...
-
2018
Chowdhury, S.A., Nardo, S.D., Hindle, Abram, Jiang, Z.M.
Execution logs are debug statements that developers insert into their code. Execution logs are used widely to monitor and diagnose the health of software applications. However, logging comes with costs, as it uses computing resources and can have an impact on an application’s performance....
-
2020
Mobile antivirus technologies incorporate static analysis which involves the analysis of programs without its execution. This technique relies on pattern matching against a signature repository to identify malware, which can be easily tricked by transformation techniques such as obfuscation....
-
2021-06-01
Patel, Himanshu, Kapoor, Vaishali, Harmanjot, Patel, Deep, Narasimhan, Karthik, Singh,Harmanpreet, Ahluwalia, Jaspreet, Reddy, Gadi Harshitha, Peruboina, Sai Sushma
Malware is rapidly spreading on mobile platforms, causing problems for users. Worldwide, 72.72% of users are using android-based smartphones. New malware is created rapidly: obfuscation techniques can evade the signaturebased mechanism implemented in current antimalware technology. This paper...
-
GreenMiner: a hardware based mining software repositories software energy consumption framework
Download2014
Hindle, Abram, Wilson, A., Rasmussen, K., Barlow, E.J., Campbell, J., Romansky, S.
Green Mining is a field of MSR that studies software energy consumption and relies on software performance data. Unfortunately there is a severe lack of publicly available software power use performance data. This means that green mining researchers must generate this data themselves by writing...
-
Fall 2020
Most modern smartphones are equipped with barometer sensors. Accessing barometers does not require any permission or user notification, as it is deemed to be harmless. We show, however, that by simply reading low-rate barometer's samples, any background application can detect user's finger taps...
-
Fall 2017
The continuous increase in the use of mobile devices has been driving research in the improvement of the energy consumption of these devices and the applications running on them. In this thesis, we present a tool that helps Android developers understand the implications of their changes to the...
-
2012
Hu, W., Han, D., Hindle, Abram, Wong, K.
Android is an operating system designed specifically for mobile devices. It has a layered architecture. In this paper, we extract Android's concrete layered architecture by analyzing the build dependency relation between Android sub-projects and use it to validate the proposed conceptual...
-
2014-01-01
The Android operating system is increasingly exposed to a growing list of dangerous malware attacks, these attacks cost users and businesses. There is considerable research into Android malware detection, malware behavior, interaction and permissions. However, there is much less research effort...