DOI QR코드

DOI QR Code

Smartphone Content Security Scheme for Protect Malware Attacks

멀웨이 공격을 예방하기 위한 스마트폰 콘텐츠 보호 기법

  • Jeong, Yoon-Su (Dept. of Information Communication & Engineering, Mokwon University)
  • 정윤수 (목원대학교 정보통신공학과)
  • Received : 2014.03.01
  • Accepted : 2014.04.20
  • Published : 2014.04.28

Abstract

Recently, smartphone are increasing in Internet-enabled applications to install and delete benefits as well as internet through various interfaces such as 3G network, Wi-Fi, Wibro without the constraints of time and place. However, the prevalence of smartphones and the activity was generated from an existing PC smartphone security threats are causing a ripple in a society. In this paper, we serve live content services on the first and last content by creating an electronic signature is the signature of either the loss of any Content provided by both authentication and non-repudiation content protection scheme is proposed. The proposed method of secure smartphone users to download and install the content or an application for downloading content over the content for secure authentication.

최근 스마트폰은 3G 망은 물론 Wi-Fi, Wibro 등 다양한 인터페이스를 통해 시간과 장소의 제약 없이 인터넷 뿐만 아니라 애플리케이션을 설치 및 삭제가 쉬워 점점 인기가 증가하고 있다. 그러나, 스마트폰의 보급과 활성에 따른 기존 PC에서 발생하던 보안 위협이 스마트폰에서도 발생하여 사회적으로 큰 파장을 일으키고 있다. 본 논문에서는 콘텐츠 서비스를 실시간으로 서비스하기 위해서 콘텐츠의 처음과 마지막에 전자 서명을 삽입하여 둘 중 하나의 서명이 손실되더라도 콘텐츠에 대한 인증과 부인방지를 모두 제공하는 콘텐츠 보호 기법을 제안한다. 제안 기법은 스마트폰 사용자가 콘텐츠를 안전하게 다운로드하여 설치하거나 애플리케이션을 통해 콘텐츠를 다운로드 할 경우 콘텐츠에 대한 안전한 인증을 수행한다.

Keywords

References

  1. M. Becher, C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf(2011), "Mobile security catching up? revealing the nuts and bolts of the security of mobnile devices", in Proceedings of IEEE Symposium on Security and Privacy, pp. 96-111.
  2. Panda-Security-Labs, "Quarterly report pandalabs", Panda Security Labs, Tech. Rep.
  3. W. Zhou, Y. Zhou, X. Jiang, and P. Ning(2012), "Detecting repackaged smartphone applications in third-party android marketplaces", in proceedings of the second ACM conference on Data and Application Security and Privacy, ACM 2012, pp. 317-326.
  4. J. Sahs and L. Khan(2012), "A machine learning approach to android malware detection", in Intelligence and Security Informatics Conference(EISIC) 2012 European, IEEE 2012, pp. 141-147.
  5. A. Bose, X. Hu, K. Shin, and T. Park(2008), "Behavioral detection of malware on mobile handsets", in Proceedings of the 6th international conference on Mobile systems applications and services, ACM 2008, pp. 225-238.
  6. C. Amrukar, P. Traynor, and P. Oorschot(2012), "Measuring ssl indicators on mobile browsers: Extended life, or end of the road?", Information Security, pp. 86-103.
  7. Sang Ok Park(2009), "The Framework for Providing Compatibility to various Web Browser Plug-ins," Master's Thesis, KAIST.
  8. R. Petke and I. King(1999), "Registration Procedures for URL Scheme Names," RFC 2717.
  9. T. Joelsson(2008), "Mobile Web Browser Extensions," Master of Science Thesis, KTH Information and Communication Technology.
  10. S. Li and J. Knudsen(2005), "Beginning J2ME Platform, From Novice to Professional," Apress, third edition, 2005.