Essays about: "Android Pattern Lock"

Found 3 essays containing the words Android Pattern Lock.

  1. 1. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  2. 2. Development of a Multi Sensor Android Application

    University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskap

    Author : Sasanka Maddala; Veerababu Velugubantla; [2020]
    Keywords : Android; Sensors; Proximity Sensor; Accelerometer Sensor; Mobile App Development;

    Abstract : There has been an enormous growth in the usage of smartphones in recent times. Smartphones are not limited to communication purposes. It has various applications designed as per the daily requirements of humans such as web-searching, online shopping, bank transactions, games, etc. READ MORE

  3. 3. Improving the Security of the Android Pattern Lock using Biometrics and Machine Learning

    University essay from Luleå tekniska universitet/Institutionen för teknikvetenskap och matematik

    Author : Jacob Nilsson; [2017]
    Keywords : Android Pattern Lock; Dynamic Time Warping; Anomaly Detection; Time Series; Behavioral Biometrics;

    Abstract : With the increased use of Android smartphones, the Android Pattern Lock graphical password has become commonplace. The Android Pattern Lock is advantageous in that it is easier to remember and is more complex than a five digit numeric code. However, it is susceptible to a number of attacks, both direct and indirect. READ MORE