 Remote Center 1075 DY Patil College of Engineering and Technology, Kolhapur, please go ahead. What is an escalation attack and which type of escalation attack can take place in android application and how we can prevent it? So in search there are no different types of escalation attacks. So one of the thing that I explained in my PPT was privileged escalation attack. So I will explain it once again. So say you have two applications. One application is having internet application permission and another one is that does not have internet permission. So say you have a service which you have implemented and that service basically takes a URL from any other activity and just downloads that file. Now the attacker knows about this service. So what he will do is he will create another application without internet permission and it will just pass the URL to your service. So he knows about your class name, so service class name and your application name. So he will just mention these two things and it will pass the URL to that application, to that application. So basically what is happening is from attacker's point of view he does not have internet permission but your application is downloading that file for him. So basically this kind of escalation attack takes place if you do not secure your application properly. Revot Center 1229 Sardar Patel Institute of Technology, Andheri Maharashtra, yes go ahead. Ma'am my question is on database, is it compulsory to create a android underscore metadata table in a database, android underscore metadata and what is it about? So when you want to structure something you need database, you cannot have data, you cannot have data just like that lying somewhere, you need to structure. So your application needs whatever it is where metadata is always very important. Metadata tells you about the data. So these are governed by the specifications that your applications, you know right from the beginning what data is important, how it is to be stored, what is to be manipulated and you know is like that. So you need metadata, previously when metadata people used to not write metadata much of the things was in the logic, you know there was no database before. So then people used to write separate logic to understand that data with you know what are called as comma separated values and sort of. Is that answered? Thank you sir. Thank you sir. Yeah thank you sir and one more question, if I am creating a database through a SQLite browser, SQLite browser that means I have to add the metadata table in that right. I said you need to add metadata because somebody should understand what that data is about. It is not very compulsory, you can I mean there is a database, the concept of database is to have metadata, you cannot just have a data lying in a file, it will be a file, it would not be a database at all, this general fundamental principle of data. Yes. Yeah I had regarding the policy enforcement right, that can the Linux has many softwares on policy enforcement like best style or else hardening OS, can that be implemented in Android OS? See there are, which policy enforcement you said, there are many hardening OS concepts like best style or something else in Linux, can that be implemented on Android? In fact see listen Android is just coming up, I think lot of things are going to happen like that and all of those things which has happened even on Windows, Linux and all of these are actually coming here. So I do not see anywhere such things you may not be able to do, you should be able to do it and if you want to go for a project like that, you should take such models which are already available, study them and you can make it and there is no reason why you cannot do it. Okay that was the question whether it can be implemented or not, thank you. You can. Yeah. One to four seven school of management and science, technical campus. Hello sir my question is regarding Android security and root access, actually there are some apps which require the root access of device, so is there any method to root the Android or any Android device or a tablet? So basically this is nothing but a hacking a device okay, so you won't find a standard answer for this but yes there are procedures, there are scripts which you can run in adb shell and root your device and but this is not actually advised because this can crash completely your device. So you are not rooting any phone, any Android device is not advisable and in case of an Aakash tablet it has been already rooted that's why you can directly connect to the adb shell and you have a root account in adb shell, so it's already rooted. So I will answer it in a slightly different way, most of the time you know if you look it from a system administration point of view or if you are a hacker then there are these tools available like rooting a device, going inside, doing something, changing, if you want to look it from a research point of view like you know what is happening inside the system, there are lots of you know work that has been going on in forensic analysis of a memory itself, you know what is really happening, it's such a small device, you know can you can you do something with those, so one way you know you are a hacker on using the already built up, already built tools, using them and then doing something changing you know putting some new module inside and then you know changing the underlying functionality, some other approaches to directly you know look in the memory, look in the process space, how it is being allocated and you know all these things, even you can you know you can instrument a device, instrument a device even at the hardware level, so there are ample amount of possibilities where you can and you can also maybe look up for a project like that, I just want to root device for mapping a memory that I am asking for rooting android devices, oh so then it should look one of the papers which was talking about forensic analysis of memory, I don't remember the name but they have done a lot of work, it's exactly rooting it first and then you know looking at how the memory is actually being structured and how it is actually what is what is where you know how it is being utilizing and how much you know is it really functioning properly, the memory manager is is it really doing it, you know people have tried to ask questions to themselves and then if you want you can look at it, there is a website, we have a website wherein you can I'll put up that link on Moodle, you can look at the work that people have done and some of one of the papers is actually listed there, one two six four Shulini University, Machal Pradesh. So one of our question is why this trail is putting so long, we have three parts ramp one is transfer and another is trail, why this trail is so long, what are the different factors, what are the different factors that are affecting trail is so long. Factors which I mean which affect what? Tail, optimization in network application, one diagram was there, that is ramp. Okay in fact you should ask the electrical engineers why they did that, in fact that is the characteristics of a device you know you have it jumps ramps up like that you know it keeps remaining like that in the on stage and then why that tail remains like that is the characteristics of a device and I'll add it something that because tail is the pre-decided amount of time it will be remain on for pre-decided amount of time and what happens in that tail time is if in the near future there is another transmission then again if after transmission transfer energy you switch the device back from high power state to low power state and in the near future like in one second or one millisecond you have another transmission then again you have to transfer the device from low power state to high power state so that will again consume the ramp energy etc. so for avoiding all those state transformations again and again we are the tail energy is kept so that if in the near future it is there then the state promotions will be minimized. 1 to 7.5 BH Garthi College of Engineering Rajkot actually my question is regarding the yesterday's session can we use Thaw party tool like flash and all that animation directly into Android. So yesterday's session was on the blender animation and yes blender animation is supported on Akash tablet. Nitin had demonstrated you that blender files can be converted to AVI MP4 and it will be normally rendered as a video file on Akash tablet. So yes answer to your question is yes animation tools are supported on Akash tablet but exactly which tool you want to run that depends I mean okay are you asking about any particular tool sir. Yes I am asking about flash files. Flash files are not supported on tablet this is sure and any other tools if you want to explore you can just check out blender is supported blender animation is supported. 1 to 1.0 go to institute. I had a question on HTML5 what kind of apps can I develop on using HTML5 for Android. So you have already seen lot of examples what kind of apps can be developed it was using HTML5 and CSS and you know lot of app if you have seen the example there was animation or happening on the HTML page there was video which was getting played on the HTML page. So you know HTML5 is a very powerful tool unlike a plain HTML you can yeah you can have a even complete games developed on using HTML5 it's very vast topic and you can definitely explore on your own this is what I mean we just wanted to demonstrate it is very powerful tool and you can just explore on it because there are lot of things which are possible using HTML5 which was not there using plain HTML. Thank you sir.