Browse > Article
http://dx.doi.org/10.7583/JKGS.2015.15.1.77

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game  

Lee, Sang Won (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Kim, Eun Jin (Department of International Industrial Information, Kyonggi University)
Abstract
As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.
Keywords
Social Network Games; Android Game Security; Memory Manipulation;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 KISA, "Statistical Survey Report of Mobile Internet", 2012.
2 KISA, "Survey Report of Mobile Internet", 2013.
3 KOCCA, "Present and Future of Social network game", 2010.
4 DMC Media, "Present and Future of Social network game", 2010.
5 Huykang Kim, YoungJun Keum, "Mobile game services security issues on Android environment", 2013
6 Yuxue Piao, JinHyuk Jung, JeongHyun Yi, "Structural and Functional Analyses of ProGuard Obfuscation Tool", The Journal of Korea Information and Communications Society, 2013
7 Lee Ju Yeob, "A Study on Programs Development of Online Game with Tightened Security", 2012.
8 Kaspersky Lab. Security News, "Researchers Find Methods For Bypassing Google's Bouncer Android Security", June 2012
9 Justin Case, "Report: Google's Android Market License Verification Easily Circumvented, Will Not Stop Pirates", August 2010.
10 Huykang Kim, YoungJun Keum, "Mobile game services security issues on Android environment", 2013
11 SangHo Lee, Dayoung Ju, "An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments", 2013
12 KiSung Lee, Huykang Kim, "Android Game Repackaging Detection Technique using Shortened Instruction Sequence", Korea Game Society, v.13, no.6, pp.85-94, 2013
13 Soonil Kim, Sunghoon Kim, Dong Hoon Lee, "A study on the vulnerability of integrity verification functions of android - based smartphone banking applications", Journal of the Korean Institute of Information Security and Cryptology v.23 no.4 , pp.743 - 755 , 2013   DOI
14 Yeonbi Chun, Sung Kyun Chang, Tack Woo, "Classification of Smartphone Game based on Mechanics", Korea Game Society, v.12, no.6, pp.15-24, 2012
15 Justin Case, "Report : Google's Android Market License Verification Easily Circumvented, Will Not Stop Pirates", 2010.
16 Kaspersky Lab. Security News, "Researchers Find Methods For Bypassing Google's Bouncer Android Security", June 2012
17 Jiyoung Woo, Ah Reum Kang, Huy Kang Kim, "Modeling of Bot Usage Diffusion across Social Networks in MMORPGs," Workshop at ACM SIGGRAPH ASIA 2012, pp. 13-18, November 2012.
18 DongYoung Woo, DongNam Seo, HuyKang Kim, JinYoung Choi, "A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain", Journal of the Korea society of IT services, 2011
19 Hanumantu Rajeswari, Ramesh Yegireddi, Vudumula Govinda Rao, "Performance Analysis of Hash Algorithms and File Integrity", Hanumantu Rajeswari et al, International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7376-7379
20 Jiyoung Woo, Huy Kang Kim, "Survey and Research Direction on Online Game Security," Workshop at ACM SIGGRAPH ASIA 2012, pp. 19-25, November 2012.