Device-centric monitoring for mobile device management

Article, Conference object, Preprint English OPEN
Chircop, Luke ; Colombo, Christian ; Pace, Gordon J. ; 13th International Workshop on Formal Engineering Approaches to Software Components and Architectures (2016)
  • Publisher: Karlsruhe Institute of Technology
  • Journal: (issn: 2075-2180)
  • Related identifiers: doi: 10.4204/EPTCS.205.3
  • Subject: Computer Science - Distributed, Parallel, and Cluster Computing | Computer software -- Development | Computer science | Mathematics | Electronic computers. Computer science | Aspect-oriented programming | Computer Science - Software Engineering | QA1-939 | QA75.5-76.95 | Computer software -- Verification | Autonomous distributed systems

The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the dev... View more
  • References (20)
    20 references, page 1 of 2

    [1] CyanogenMod. http://www.cyanogenmod.org/ , [Online; accessed 30-April-2015].

    [2] San Francisco ZTE Blade Mobile Phone. http://www.gsmarena.com/zte_blade-3391.php , [Online; accessed 30-April-2015].

    [3] Study for insight on Mobile Device Usage. https://s3-ap-southeast-1.amazonaws.com/ tap-sg-media/theAsianparent+Insights+Device+Usage+A+Southeast+Asia+Study+November+ 2014.pdf , [Online; accessed 25-March-2015].

    [4] Cyrille Artho, Howard Barringer, Allen Goldberg, Klaus Havelund, Sarfraz Khurshid, Mike Lowry, Corina Pasareanu, Grigore Ros¸u, Koushik Sen, Willem Visser et al. (2005): Combining test case generation and runtime verification. Theoretical Computer Science 336(2), pp. 209-234, doi:10.1016/j.tcs.2004.11.007.

    [5] Fabio Barbon, Paolo Traverso, Marco Pistore & Michele Trainotti (2006): Run-Time Monitoring of Instances and Classes of Web Service Compositions. In: ICWS '06: Proceedings of the IEEE International Conference on Web Services, IEEE Computer Society, Washington, DC, USA, pp. 63-71, doi:10.1109/ICWS.2006.113.

    [6] Andreas Bauer, Jan-Christoph Ku¨ster & Gil Vegliach (2012): Runtime Verification meets Android Security. In: Proceedings of the 4th NASA Formal Methods Symposium (NFM), LNCS 7226, Springer, pp. 174-180, doi:10.1007/978-3-642-28891-3 18.

    [7] Christian Colombo, Adrian Francalanza, Ruth Mizzi & Gordon J Pace (2012): polylarva: Runtime verification with configurable resource-aware monitoring boundaries. In: Software Engineering and Formal Methods, Springer, pp. 218-232, doi:10.1007/978-3-642-33826-7 15.

    [8] Thomas S. Cook, Doron Drusinksy & Man-Tak Shing (2007): Specification, Validation and Run-time Moniroting of SOA Based System-of Systems Temporal Behaviors. In: System of Systems Engineering (SoSE), IEEE Computer Society, doi:10.1109/SYSOSE.2007.4304313.

    [9] Marcelo d'Amorim & Klaus Havelund (2005): Event-based runtime verification of Java programs. In: ACM SIGSOFT Software Engineering Notes, 30, ACM, pp. 1-7, doi:10.1007/978-3-642-03240-0 13.

    [10] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel & Anmol N. Sheth (2010): TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, USENIX Association, Berkeley, CA, USA, pp. 1-6, doi:10.1.1.179.3303. Available at http://dl.acm.org/citation.cfm?id=1924943.1924971.

  • Related Research Results (1)
  • Similar Research Results (3)
  • Metrics
    No metrics available
Share - Bookmark