Browse > Article
http://dx.doi.org/10.5762/KAIS.2014.15.11.6849

Study on Mechanism of Preventing Application Piracy on the Android Platform  

Lee, Kwang-Hyoung (Dept. of Internet Information, Seoil University)
Kim, Jae-Yong (Dept. of Computer Science, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.15, no.11, 2014 , pp. 6849-6855 More about this Journal
Abstract
Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.
Keywords
Android; App Encryption; Code Fraud Prevention; Device Authentication;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Jegal Byeongjik.: Smartphone Market and Mobile OS Trends. Semiconductor Insight (2011)
2 Android Under Attack: Malware Levels for Google's OS Rise Threefold in Q2 2012, http://www.kaspersky.com/about/news/press/2012/Android_Under_Attack_Malware_Levels_for_Googles_OS_Rise_Threefold_in_Q2_2012
3 Chan-Hee Lee, Yeong-Ung Park, Ji-Hyeog Lim, Hong-Geun Kim, Choong-Hyun Lee, Seong-Je Cho and Jaesoo Yang, Jounal of KIISE : Computing Practices and Letters, Vol 18, No.10, pp.692-700, (2012)
4 T. Bradley, "DroidDream Becomes Android Market Nightmare," PCWorld, Mar.2011, http://www.pcworld.com/article/221247/droiddream_becomes_android_market_nightmare.html
5 Steve Gold, "Android insecurity," Network Security, vol.2011, Issue.10, pp.5-7, (Oct. 2011).
6 GingerMaster, http://www.cs.ncsu.edu/faculty/jiang/GingerMaster/
7 Juniper Networks, "Mobile Signature," http://www.juniper.net/us/en/security/mobile-threat-center/#ANDROID
8 DroidDream, http://blog.mylookout.com/blog/2011/03/01/security-alert-malware-found-in-official-androidmarket-droiddream/
9 C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report No. 148, Univ. Auckland, New Zealand, (1997).
10 ByeongYong Lee1, YongSoo Choi2, : The Status and Analysis of Obfuscation Techniques and Perspective Development. Journal of Security Engineering, Republic of Korea, vol.5, No. 3, pp.692-700, (2008).
11 S. Choi, M. Kim, J. Han, B. An, "Android Based Mobile Student Identity Card", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 13, No. 2, Apr. 2013.
12 E.-J. Jo, C.-H. Lin, "Smart Emotion Lighting Control System Based on Android Platform", The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 14, No. 3, pp.147-153, Jun. 2014.
13 J.-M. You, I.-K. Park, "Android Storage Access Control for Personal Information Security", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 13, No. 6, Dec. 2013.
14 S.-C. Lim, "A Study of Android Launcher based on Application Virtualization", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 13, No. 2, Apr. 2013.
15 J.-g. Lim, C.-s. Choi, T.-e. Park, H.-s. Ki, B. An, "Android Based Mobile Combination Login Application", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 13, No. 3, Jun. 2013.
16 Loyce Consulting.: 2011 Market Survey of Smart Content. KOCCA Research Report 11-66, Korea Creative Content Agency (2011)