Welcome to our Site!

Security Engineering is a research group based in Peshawar, Pakistan specializing in security and service oriented architectures related areas. Our areas of focus are Remote attestation via Trusted Computing standards on ubiquitous and mobile platforms. Our research proposes behavioral paradigm for remote attestation. The purpose of this blog i...Read More

easip-web5
October 25th, 2010 By Owais

Real world Use Cases for Target Android Applications and the Design of New Policy Language ABSTRACT Access Control model gives option to the user to either grant or revoke a specific permission pertaining to use of a particular resource e.g. revoking the permission from a particular application to make...

Read All
easip-web4
October 25th, 2010 By Owais

Strengths and Weaknesses of Policy Enforcement Mechanism for Open Source mobile platform  ABSTRACT  This report is written on behalf of research project EASIP ( Extending Android Security for Intent Policies) funded by ICT R&D, to SERG (Security Engineering Research Group). The report describes...

Read All
easip-web3
October 25th, 2010 By Owais

SELECTIVE PERMISSION MECHANISM FOR ANDROID ABSTRACT Smartphones, combining the mobility and personal nature of cell phones with the strengths of desktop computers, are fast becoming popular. Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily...

Read All
easip-web1
October 25th, 2010 By Owais

Analysis of Dalvik Virtual Machine and Class Path Library ABTRACT Android is an open source complete software stack (that includes operating system, Linux kernel, middleware and some useful applications) for mobile platforms; proposed by Open Handset Alliance, a global alliance of leading technology...

Read All
easip-web9
October 25th, 2010 By Owais

Policy writing tool and Usage Documentation OBJECTIVE The objective of this deliverable is to deliever to the user a prototype of the GUI for the pollicy writing tool for entering high level Android Usage policies and convert it to target Andoroid XML file since the exisiting Android security mechanism...

Read All

This is a very confusing thing to understand and search for in the first place but once you get to understand how the OE workflow works then one can make such adjustments. Here I will give you a quick start on how to do it. I assume that you will be dealing with shr-unstable build in OE. My working...

Read All

I am assuming we are working with SHR as our prefered distro. cd /home/moko/shr-unstable Chose your preferred editor …. in my case it was vim. vi conf/auto.conf change the MACHINE = “om-gta02″ to “qemuarm” or any of your choice from /home/shaz/moko/shr-unstable/openembedded/conf/machine....

Read All
Principles of Isolation – Part 1
October 19th, 2010 By shazkhan

This is part 1 in a series of 3 short essays to introduce the reader to the principles of isolation in distributed information systems. Any typical information system is by nature a distributed application/system. Therefore we have a client side, a server side and a means of communication. As an...

Read All