• Title/Summary/Keyword: 전화번호부

Search Result 32, Processing Time 0.031 seconds

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.

Sample Distortion in Social Surveys and Effects of Weighting Adjustment: A Study of 18 Cases (사회조사에서 표본의 왜곡과 가중치 보정의 결과: 18개 사례연구)

  • Huh, Myung-Hoe;Yoon, Young-A;Lee, Yong-Goo
    • Survey Research
    • /
    • v.5 no.2
    • /
    • pp.31-48
    • /
    • 2004
  • We collected and analyzed 18 social surveys to assess the quality of samples with respect to region, gender, age-band, education level and occupation. We found in our samples that highly educated people and house wives are over-represented whereas low educated people, self-employed/blue collars and white collars are under-represented. To correct such sample distortions, we applied the iterative proportional weighting or the raking to our samples. We observed sizable changes in survey results. Also, the effective sample sizes were shrunken up to 20%-40%, that could be interpreted as the necessity of larger samples to meet the claimed sampling error limits.

  • PDF

Adaptation of Contextual Research on Elderly Users' Needs in Using Mobile Phone (문맥적 조사기법을 적용한 고령사용자의 휴대폰 관련 요구사항 도출에 관한 연구)

  • Kim, Hyun-Jeong;Heo, Jung-Yoon;Park, Soo-Jung;Kim, Mi-Young;Shim, Jung-Hwa;Park, Sang-Hyun
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.7-14
    • /
    • 2007
  • 디지털 컨버전스가 가속화됨에 따라 휴대폰의 기능은 나날이 복잡해져 가고 있으며, 이러한 경향은 사람들에게 자신에게 불필요한 기능까지 익혀야 하는 불편함을 초래하고 있다, 특히, 단순한 통화방식에 익숙하고 인지적으로 새로운 것을 유연하게 받아들이지 못하는 고령 사용자들에게도 이미 생활필수품이 된 휴대폰은 사용하는데 어렵고 불편한 부분이 많이 있다. 본 연구에서는 한국의 고령사용자들을 대상으로 휴대폰 사용에 있어 문맥적, 정성적 조사(Contextual & Qualitative research)기법을 적용하여 평소 그들이 일상생활에서 느끼는 휴대폰 관련 요구사항을 도출하고자 하였다. 조사는 세 단계로 이루어졌다. 먼저, 휴대폰을 사용 중인 60대 이상 고령사용자 83명을 대상으로 사용 현황 및 수준을 파악하고 적절한 사용자를 섭외하기 위한 설문을 진행하였으며, 둘째, 초보사용자 8명, 중급사용자 3명을 대상으로 휴대폰 사용 기록을 기반으로 하는 심층인터뷰를 진행하였으며, 초보사용자들을 대상으로는 문자메세지, 전화번호부, 카메라 폰 기능 교육 세션을 통한 행동 관찰법을 시행하였다. 마지막으로, 교육 세션 한달 후, 사용성 평가와 추가 인터뷰를 진행하였다. 이상과 같이 장기간에 걸친 사용자 조사를 통해, 고령사용자들의 휴대폰 사용에 있어 심리, 문화적 특이사항과 인터랙션 상의 불편요소들을 발견할 수 있었으며, 수집된 동영상 데이터를 분석하여 고령사용자의 휴대폰 관련 요구사항을 신체적 요인, 인지적요인, 심리적 요인의 세가지로 구분하여 제시하였다. 본 연구에서는 문맥적, 정성적 사용자 조사를 통해 고령사용자들의 일상생활에서의 휴대폰 관련 요구사항을 도출함으로써 풍부하고 실증적인 경험데이터를 수집할 수 있었다. 이와 같이 도출된 요구사항 데이터는 이후 고령사용자를 위한 유니버설 디자인 휴대폰 개발 전략수립과 UI 디자인 개발에 활용되었다. 뿐만 아니라, 이 연구는 휴대폰 사용 경험 연구에 적용할 수 있는 문맥적 조사기법 프로세스의 사례를 제시하고 있다는데 의의가 있다고 하겠다.

  • PDF

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

A Study on the Mobile Emergency Service Protocol (모바일 긴급서비스 프로토콜 연구)

  • Jang Jeong-Ah;Choi Hae-Ock;Choi Wan-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.224-231
    • /
    • 2006
  • The location information of wired 112, 119 emergency call is provided immediately by subscriber database of KT. But emergency call made by mobile phone should be ask location information to mobile network. This paper proposes the network protocol for mobile emergency service refer to TIA/EIA/J-STD-036-A with reviews about technical issues, legacy factors and related researches. The mobile emergency service is divided to mobile emergency rescue service and mobile emergency alert service. The network reference model for mobile emergency rescue service is released in domestic sector. In this paper, the interfaces between modules of the network reference model, and service scenarios, message flows are defined. Supplement to mobile emergency rescue service, the network reference model, interfaces and message flows for mobile emergency alert service are developed.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Systematic Bias of Telephone Surveys: Meta Analysis of 2007 Presidential Election Polls (전화조사의 체계적 편향 - 2007년 대통령선거 여론조사들에 대한 메타분석 -)

  • Kim, Se-Yong;Huh, Myung-Hoe
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.2
    • /
    • pp.375-385
    • /
    • 2009
  • For 2007 Korea presidential election, most polls by telephone surveys indicated Lee Myung-Bak led the second runner-up Jung Dong-Young by certain margin. The margin between two candidates can be estimated accurately by averaging individual poll results, provided there exists no systematic bias in telephone surveys. Most Korean telephone surveys via telephone directory are based on quota samples, with the region, the gender and the age-band as quota variables. Thus the surveys may result in certain systematic bias due to unbalanced factors inherent in quota sampling. The aim of this study is to answer the following questions by the analytic methods adopted in Huh et al. (2004): Question 1. Wasn't there systematic bias in estimates of support rates. Question 2. If yes, what was the source of the bias? To answer the questions, we collected eighteen surveys administered during the election campaign period and applied the iterated proportional weighting (the rim weighting) to the last eleven surveys to obtain the balance in five factors - region, gender, age, occupation and education level. We found that the support rate of Lee Myung-Bak was over-estimated consistently by 1.4%P and that of Jung Dong-Young was underestimated by 0.6%P, resulting in the over-estimation of the margin by 2.0%P. By investigating the Lee Myung-Bak bias with logistic regression models, we conclude that it originated from the under-representation of less educated class and/or the over-representation of house wives in telephone samples.

An Analysis of Occupations of Korean immigrants in Auckland, New Zealand (뉴질랜드 오클랜드지역 한국인의 생업 분석)

  • Yoon, Hong-Key;Yim, Seok-Hoi
    • Journal of the Korean Geographical Society
    • /
    • v.32 no.4
    • /
    • pp.491-510
    • /
    • 1997
  • The main purpose of this study is to analyse and explain the occupational pattems of Korean immigrants in Auckland, New Zealand, in order to understand how they are adapting to New Zealand society. We analysed the Korean telephone directory from 1992 to 1996 and listings of Korean businesses in the biweekly magazine 'Korea Town'. The bulk of Korean immigration started in 1991 when the New Zealand govemment opened up its immigration doors to non-Europeans. Clearly, recent Korean immigration has experienced exponential growth. The range of Korean's occupations has grown gradually compared to the growth of Korean immigration, from about 20 different kinds of occupations in 1992 to 55 in 1997. In 1992, there were only 37 korean businesses listed, but in 1997, there are about 636-a growth of over 1,600${\%}$. As we analysed all Korean businesses, we found that almost all Korean businesses and occupations have not penetrated the host society economy but reflect typical characteristics of ethnic businesses, in tems of capital, business operation, employees and customers being mainly Korean, Korean businesses are concentrated in the City Centre and North Shore. The concentration in North Shore reflects the concentration of Korean residents in this area, while Korean businesses in the City centre are mostly tourist industries(travel agencies, souvenir shops)and restaurants. The findings of this study closely reflect similar Westem studies on ethnic minority businesses. From this, we can conclude that Korean businesses at the moment reflect the initial stage of Korean communities in New Zealand.

  • PDF