In addition to the Trace files captured by the AT&T ARO Data Collector, the AT&T ARO Data Analyzer also allows you to analyze Pcap files that have been captured using a program like Wireshark or Windows Network Monitor. When you open the "File" menu of the Data Analyzer, you will see options for "Open Trace" and "Open Pcap File". For more information on opening a trace file in the AT&T ARO Data Analyzer for analysis, please refer to the AT&T User Guide.
Our customers expect a fast network and blazing-fast speeds. By helping applications reduce their impact on the network, we can continue to provide that level of service.
Optimizing your app is a bit like getting in the carpool lane during rush-hour: You get to where you're going that much faster, and everyone else experiences a little less gridlock.
Yes, we would love that! Please fork and contribute to our open-sourced AT&T ARO repo on Github. We want to see what you can do!
The AT&T ARO Data Analyzer is supported on Microsoft Windows XP, Windows Vista, Windows Seven, Windows 8 (x86), and on Mac OS X 10.6 and above.
No. We collect basic usage analytics (i.e. whether AT&T ARO is running, timestamps, device type), but we do not collect any information about your trace.
Application traces that contain large network bursts, like those that can occur when capturing a long session with complex mapping applications or rich social media applications, may take an extremely long time to load in the ARO Data Analyzer. This issue is caused by the complex algorithms that are used to calculate the analysis of the burst data, and is not an issue with available memory. In these cases, the ARO Data Analyzer may appear to hang, but will eventually load the trace analysis.
The AT&T ARO Data Analyzer does not currently support pcap.ng (PCAP Next Generation) files, and cannot display network traffic data from files in this format. The most recent versions of Wireshark (1.7 and 1.8), contain a new version of the Dumpcap tool that captures packet data in the pcap.ng format by default, instead of the pcap format, as previous versions did. To use Wireshark 1.7 or 1.8 to capture data in the pcap file format so that it is compatible with the AT&T ARO Data Analyzer, you must specify the flag '-P'.
The ARO Windows 8 Data Collector (32-bit), available from the Visual Studio Gallery, can be only be used to collect data from applications running on Windows 8 tablets that are sold by AT&T. However, it does support 32-bit Windows 8 notebooks and desktops, and the ARO Windows 8 Data Collector (64-bit) supports 64-bit Windows 8 notebooks and desktops.
Lookout's Platform API extracts key data points from an application that can be used for correlation and analysis to identify application content, capabilities, and behaviors. You own your application and are not granting any rights to your code except for application screening services and security as described in the Application Screener Terms and Conditions.
Yes. AT&T ARO has an integrated security scan capability provided by Lookout Security which offers developers the ability to scan their apps for potential security threats. This can be done through a new option on the Tools menu in the AT&T ARO Data Analyzer that allows developers to submit an app, view the results of the security scan on the app, and review the history of their previous app submissions.
Uninstall your current version of Java and install the Oracle support version of Java (version 1.7), before installing AT&T ARO. This issue does not occur with a clean install of OS X 10.8, it only occurs when the OS has been upgraded to OS X 10.8 from a previous version.
To analyze a trace file in the AT&T ARO Data Analyzer that was captured using the ARO Windows 8 Data Collector, you must have Windows Network Monitor (Netmon) installed.
If Lookout detects malware in your application, please contact ARO@lookout.com for additional information and support.
Apply this patch:
> diff --git a/ARODataAnalyzer/bin/aro b/ARODataAnalyzer/bin/aro > old mode 100644 > new mode 100755 > diff --git a/ARODataAnalyzer/c/Makefile b/ARODataAnalyzer/c/Makefile > index baae45e..c470f2d 100644 > --- a/ARODataAnalyzer/c/Makefile > +++ b/ARODataAnalyzer/c/Makefile > @@ -39,7 +39,7 @@ PCAP_INCLUDE = /usr/include > #PCAP_INCLUDE = /usr/include/pcap > > #CC = cl > -CC = gcc > +CC = gcc -fPIC > > all: libjpcap.so >
export JAVA_HOME=/usr/lib/jvm/java-6-oracle #or whatever their java is cd c; make sudo cp libjpcap.so $JAVA_HOME/jre/lib/amd64/. #replace amd64 with their arch sudo chmod 644 $JAVA_HOME/jre/lib/amd64/libjpcap.so cd ../bin chmod 755 aro ./aro
Yes. Please contact ARO@lookout.com for support.
Lookout's API currently supports Android applications only.
When a developer uploads an application, the Lookout API collects a valid email address for the developer. In the event that malware is detected in the scan, the developer may be notified directly (via the address provided) to resolve the issues.