Android toolkit audit and prevent attack from oem (CPU, DISK, Wi-fi, Bluetooth, radar, radio frequency, ...)
First, I will introduce the working environment by talking about hardware constraints. The recordings were made with a Samsung Galaxy S9+ using a magnetometer model "Magnetic Sensor, 1209-002401". The sensor expresses a magnetic field vector of format B(x,y,z) expressed in uT. For the moment I have no more information to bring you. The objective from an application point of view is to get the most information from this signal. For that a file describing the signal is provided whose dataset can be improved if needed.
ID | Description | Difficulté | Priorité |
---|---|---|---|
1 |
US1: As a User, I want to be able to get apximated value from neighborhood devices. to do this, I go to the endpoint "/proximity", I provide a csv or json. Dataset will be contains following pameters.
|
1 | HIGH |
2 |
US2: As a User, I want to be able to do a signal analysis. to do this, I go to the home page, I can choose to enter by hand or import a csv. I submit a set of data to the application, with the following parameters.
|
1 | HIGH |
3 |
US3: As a User, I want to be able to select a specied range of frequency. to do this, i select with an input a data range. In order to update data in analyzed signal. |
1 | HIGH |
4 |
US4: As a User, I want to be able to change format of data viz. to do this, i select in the input sinusoidal mode or numerical output. In order to, visualize in real time analyzed signal. |
1 | LOW |
5 |
US5: As a User, I want to be able to exploit signal datagrame header. to do this, A menu on the right with the data of the header, the datagram will allow to visualize the data in hexadecimal format In order to exploit the datagram provided. |
1 | LOW |