Main Subjects : Computer Security

User Centric Android Application Permission Manager

Belal Mohammed Amro; Zaid Abu Znaid

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 2, Pages 213-223
DOI: 10.33899/csmj.2021.170043

Mobile malware has become a very hot research topic in the last few years, and this was due to the widespread usage of mobile devices all over the world. Like other systems, mobile devices are prune to different attacks that might invade user’s privacy and lead to private data leakage. Millions of Mobile application have been developed and used Worldwide, most of them are requiring permissions to work properly. The permission management problem is more apparent on Android systems rather than other mobile systems such as iOS. Some of these permissions might lead to successful security attacks on Android systems and hence lead to privacy leakage. To reduce the possibility of such attacks, many researchers have proposed mobile applications that help users to manage access permissions for their mobile applications. Most of the proposed systems lack the ability to profile users according to their preferences and do not provide automatic follow up with temporary granted permissions. In this research, we propose a User Centric Android Application Permission Manager tool called (UCAAPM), that provides an efficient and flexible way for managing permissions and profiling these permissions for each user, these profiles can be used on any Android device. UCAAPM will automatically follow up users permissions and grant/deny the permission on a scheduling basis defined by the user’s profile and according to his preferences. Experimental results showed that the tool works efficiently in terms of CPU, RAM, and power consumption, furthermore users are highly satisfied with using it.

Analyzing Crime Networks: A Complex Network-Based Approach

Husam B. Sultan; Basim Mohammed Mahmood

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 57-73
DOI: 10.33899/csmj.2021.168261

This article analyzed the crime network of Nineveh province based on the concepts of Complex Networks. To this end, two networks were created; the first represented the crimes that were committed in Nineveh province, while the second was the network of crime regions. These two networks were visualized and then analyzed using network centrality measurements. The results showed that several pairs of crimes had strong relations to each other. Moreover, it was found that some crime regions were considered as the core of crimes in the province. The results also showed that few regions were considered as the most dangerous parts of the province and they had strong tendencies to replicate their behaviour to other regions. Finally, the authors believe this is the first kind of works that take the crime network of Nineveh province as a case study

Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

Mohammad S. Hashim; Melad jader saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2021, Volume 15, Issue 1, Pages 147-158
DOI: 10.33899/csmj.2021.168266

Local networks and the Internet increase day by day, and a large amount of information is transferred across these networks every day resulting in a dramatic increase in the information security threats.
Therefore, it was necessary to use the techniques that ensure the security and the confidentiality of the transferred information. Secret writing is a general term which is used to refer to the protection of information from attackers, and it includes two types of widely used technologies: cryptography and steganography.
The research has presented a security model that fulfils the requirements of confidentiality and safety of the data transferred between the parties of the communication process. This model includes two phases that aim to provide a high level of confidentiality and security for the secret text. New methods have been used to combine cryptography with steganography to attain a high level of secrecy and security where the secret text was encrypted in an innovative and modified way by encoding DNA (Deoxyribo Nucleic Acid( and hiding the resulting encrypted text inside images by means of EMD) Exploiting Modification Direction) method.
This method has been applied on a number of images and texts, and the measurement of PNSR (88.5382, 87.0293, 97.8257), MSE (0.000015, 0.000019, 0.00004), CO (0) and Q-Factor (0.3521,3458,0.3354) values in the resulting hidden images have been yielded good results.

Family GPS Tracking for Android

Mafaz M. Al-Anezi; Hisham D. Zebari; Saad N. Birfkani

AL-Rafidain Journal of Computer Sciences and Mathematics, 2020, Volume 14, Issue 1, Pages 31-38
DOI: 10.33899/csmj.2020.164674

In smart phone field, the security, tracking lost and kidnapping prevention are one of the main areas in current days. Today family members safety is more important when they are outside home. So, there is a need for a tracking system for kids where the parents can monitor their kids at anytime from anywhere.
These security goals are achieved by the Android System, Global System for Mobile (GSM), Global Positioning System (GPS) and Short Message Service (SMS) technologies.
The proposed application must be installed in all family member's smart phones, and these smart phones will use GPS services without need for internet connection, where the GPS is used to locate the child specifically and to track the child whenever he changes his place. The location obtained by only depending on GSM by sending SMS which contain a link of Google map shows the information of the position. The application also has the ability to trigger a help SMS to his parents when the child is in a dangerous situation by using his headphone, and this is considering a help message in real time.

Encryption Binary Images by Using Template Matching

Sundus Khaleel Ebraheem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2006, Volume 3, Issue 2, Pages 43-69
DOI: 10.33899/csmj.2006.164058

Text encryption is a very important field in application of data transformation through the digital networks, and the Internet, so it is very necessary to do encryption operation on the text data to get more security in data transformation.
In this paper, we present a method -Template Matching- to encrypt data which is represented in form of image with BMP extension by using Mono Digital Images method with partial compression for the data by using RLE method which increases the security of the method and reduces the file size.
The application results is efficient for the printed or handwritten text in Arabic or English or any other language, and for the maps or sketches images. The method gives a good ability for data encryption. It is suitable for data transformation through the Internet networks.