• Title/Summary/Keyword: 앱 보안 검증

Search Result 28, Processing Time 0.022 seconds

Probabilistic K-nearest neighbor classifier for detection of malware in android mobile (안드로이드 모바일 악성 앱 탐지를 위한 확률적 K-인접 이웃 분류기)

  • Kang, Seungjun;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.817-827
    • /
    • 2015
  • In this modern society, people are having a close relationship with smartphone. This makes easier for hackers to gain the user's information by installing the malware in the user's smartphone without the user's authority. This kind of action are threats to the user's privacy. The malware characteristics are different to the general applications. It requires the user's authority. In this paper, we proposed a new classification method of user requirements method by each application using the Principle Component Analysis(PCA) and Probabilistic K-Nearest Neighbor(PKNN) methods. The combination of those method outputs the improved result to classify between malware and general applications. By using the K-fold Cross Validation, the measurement precision of PKNN is improved compare to the previous K-Nearest Neighbor(KNN). The classification which difficult to solve by KNN also can be solve by PKNN with optimizing the discovering the parameter k and ${\beta}$. Also the sample that has being use in this experiment is based on the Contagio.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

Security and Trust on Non-Contact Financial Transaction (금융보안과 신뢰가 비대면 금융거래에 미치는 영향)

  • John, Yong-Jean
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.147-154
    • /
    • 2021
  • The pandemic age came to us after the COVID19 broke out in the early of 2020, which resulted in many changes in our everyday life. One of the changes is non-contact transactions in economic activities, especially contact-free financial transactions are ever-increasing activities in the pandemic age. In non-contact financial transactions, security and trust are important issues that users are concerned about the most. So the paper examines how security and trust have effects on the attitudes of bank customers who use mobile banking applications on their smartphones. The study conducted factor ananlysis to extract research constructs using survey data gathered during Nobember of 2020 through February of 2021 across the nation. After extracting the constructs, the study checked validity, sampling adequacy, and internal reliability with KMO, Bartlett's test, and Crombach Alpha respectively. To make sure the purpose of the study, I do regression analysis. All factors of attitude had impacts on willingness on both of transactions and purchasing financial products. The results could give guidelines banks which want to attract more customers in open-banking environment through ever-more secure and trusty mobile banking application.

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF

The Study on the Structural Relationship for Improving Convergency Mobile Public Service : Focused on Mobile App of Integrated Electronic Tax Bill (융복합 모바일 공공서비스 성과 향상 위한 구조적 관계에 관한연구 : 통합 전자세금 청구서 앱을 중심으로)

  • CHoi, Myeong-guk;Chung, Ki-Han
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.275-285
    • /
    • 2015
  • The purpose of this study is to investigate the relationship among app's and user's characteristics, perceived use easiness, use intention, and actual use in mobile app of integrated electronic tax bill. Appropriate measures were developed and this study used structural equation modeling to analyze the relationships among the constructs. The results of 215 taxpayers showed that informativeness, security of app's characteristics, and innovativeness of user's characteristics have positive impacts on perceived use easiness but convenience and familiarity have negative impacts on it. Perceived use easiness, convenience, and security have positive impacts on use intention but familiarity has a negative impact on it. Use intention has a positive impact on actual use but perceived use easiness has a negative impact on it. Thus, managers should focus on the app's and user's characteristics for effectiveness and efficiency of integrated electronic tax bill.

Factors Influencing the Reuse Intention of Social Commerce Foodservice Product - Perceived Risk and Price Consciousness - (소셜커머스 외식상품 재이용의도의 영향요인 - 지각된 위험과 가격의식성을 중심으로 -)

  • Jeon, Hyeon-Mo;Kwon, Na-Kyung
    • Culinary science and hospitality research
    • /
    • v.22 no.4
    • /
    • pp.114-127
    • /
    • 2016
  • The study, focused on social commerce food service consumers, attempted to test the relationship between perceived risk and price consciousness, and suggested that perceived risk and price consciousness, the the degree to which price is considered when purchasing goods, affect reuse intention. Through such test results, the study aimed to provide useful practical implications for establishing marketing strategies of companies related to food service social commerce, and those looking into behavioral intentions of social commerce using food service consumers. The subjects of the study were male and female residents of Korea over 2-years of age who have had some experience purchasing a dining out item through social commerce. The social commerce company selected for sampling was Coupang, which was the number 1 shopping App in 2014 based on the number of yearly visitors. A questionnaire-based survey was conducted on respondents who had indicated that they had experience purchasing foodservice goods through Coupang. The results revealed that source risk, privacy risk, psychological risk, and time-loss risk had negative influences on reuse intention. However, social risk and financial risk did not exhibit any influences. Price consciousness had positive influences on reuse intention. The study explored perceived risk and price consciousness as elements to affect continuous use of social commerce of foodservice consumers.