Operating System

Authors

  • Swaranjali Mane SY Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Kajal Shinde SY Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Shilpa Waghmode SY Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Nandini Shinde SY Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Sanika Avaghade SY Students, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author
  • Mr. Godase R. C. Lecturer, Department of Computer Engineering, Sahakar Maharshi Shankarrao Mohite Patil Institute of Technology and Research, Akluj, Solapur, Maharashtra Author

DOI:

https://doi.org/10.29070/e0y9gg21

Keywords:

Android OS, Linux Kernel, Open-Source Platform, DVM, Android Version

Abstract

It has been located that now day maximums of the human beings are the use of Android gadgets like mobile, cellphone and tablet. The android running System has grown to be one of the maximum famous running machines primarily based totally on Linux kernel and it presently advanced via way of means of Google. These days, tens of thousands and thousands of latest customers use Android structures each year. There are 4 simple a part of Android Operating System i.e., the kernel, libraries, software framework and Application. In this paper we describe the history, framework, function of every model of android running machine.

Downloads

Download data is not yet available.

References

US Department of Defense: Trusted Computer Systems Evaluation Criteria, Technical Report CSC-STD-001-83, DoD Computer Security Center, Fort Meade, MD (1983).

Anderson, J. P. (1972). Computer Security Technology Planning Study, Technical Report Vols. I and II, USAF Electronic Systems Div., Bedford, Mass.

Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I. and Warfield, A.: Xen and the art of virtualization, Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP ’03, New York, NY, USA, ACM, pp. 164–177 (2003).

Kivity, A., Kamay, Y., Laor, D., Lublin, U. and Liguori, A. (2007). kvm: the Linux virtual machine monitor, Proceedings of the Linux Symposium, Vol. 1, pp. 225–230.

Waldspurger, C. A. (2002). Memory resource management in VMware ESX server, SIGOPS Oper. Syst. Rev., Vol. 36, pp. 181–194.

Garfinkel, T. and Rosenblum, M. (2003). A virtual machine introspection based architecture for intrusion detection, Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS), Vol. 1, ISOC, pp. 253–285.

Volatile Systems, L. (2006). The Volatility Framework: Volatile memory artifact extraction utility framework.

Downloads

Published

2022-03-01