• Title/Summary/Keyword: 역공학 공격

Search Result 33, Processing Time 0.02 seconds

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A Study on the Possibility of Securing Command of the Air in Local War (지상군의 국지제공권 확보 가능성 연구)

  • Lee, Chang In;Jung, Min Sup;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.173-179
    • /
    • 2022
  • Through the 2014 Donbas conflict and the 2022 Ukraine-Russia war, we are experiencing that the command of the air is no longer only secured by the Air Force. Long-range surveillance reconnaissance and strikes carried out by the Air Force could be replaced by drones and missiles, and the enemy's aerial attacks could be controlled by air defense systems such as Panchir and portable anti-aircraft missiles, allowing ground forces to carry out maneuvers freely. In other words, it is much more advantageous for the air force and the navy to take control of the air through long-distance operations, and the ground forces should support them. Therefore, this study aims to consider the cost-effectiveness aspect of the delivery command of the air; it provides implications for quickly responding to enemy air attacks by developing the air defense weapon system, drones, missiles, precision-guided munitions, etc rather than focusing on expensive fighter jets.