• Title/Summary/Keyword: APK

Search Result 50, Processing Time 0.024 seconds

A Study on Potential Security Threats that Occurred Possibly by Permission Requests in Android Environment (안드로이드 환경에서 권한 요구를 통해 발생 가능한 잠재적 보안위협에 관한 연구)

  • Park, In-Kyu;Choi, Seul-Ki;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.258-261
    • /
    • 2017
  • 안드로이드 애플리케이션 개발 시 특정 기능을 수행하기 위해 필수적으로 AndroidManifest.xml 파일에 권한을 등록한다. 등록된 권한은 애플리케이션 설치 시 사용자에게 동의를 요구하며 애플리케이션을 설치하기 위해 해당 애플리케이션이 요구하는 사용 권한 모두를 동의해야 한다. 애플리케이션이 요구하는 권한에 동의하지 않을 경우 애플리케이션 설치가 취소되며, 권한 요구에 대한 동의 없이 애플리케이션을 설치할 수 없다. 이러한 이유로 대부분의 사용자는 애플리케이션이 본래의 기능과 맞지 않는 필요 범위 이상으로 요구하는 권한까지도 상세하게 살펴보지 않고 동의하여 본래의 기능과 관계없는 권한을 통해 개인정보 유출, 비정상적인 과금 유발 등 다양한 보안위협이 발생한다. 본 논문에서는 안드로이드 애플리케이션의 APK 파일을 통해 애플리케이션이 요구하는 권한과 실제 애플리케이션이 기능 제공을 위해 사용하는 API 목록을 확인하여 애플리케이션이 필요 범위 이상으로 요구하는 권한을 분석한다. 또한, 애플리케이션 업데이트 시 API 추가로 인해 발생할 수 있는 보안위협을 분석한다. 이를 통해 필요 범위 이상으로 요구하는 권한으로 발생할 수 있는 보안위협에 대해 사전에 인지하여 이를 방지할 수 있도록 한다.

Code Obfuscation using Java Reflection and Exception in Android (안드로이드 환경에서 클래스 반사와 예외 처리를 이용한 임의 코드 수행 방법 및 코드 은닉 방법)

  • Kim, Ji-Yun;Go, Nam-Hyeon;Park, Yong-su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.369-370
    • /
    • 2014
  • 본 논문에서는 안드로이드 환경에서 클래스 반사(Reflection)과 예외처리를 이용하여 안드로이드 보호 시스템을 우회하여 임의의 코드를 수행할 수 있는 방법을 제시한다. 일반적인 자바 환경과는 달리 안드로이드 환경에서는 보안 강화를 위해 APK 파일 내 루트 디렉토리의 클래스 파일만을 반사를 통해 동적 로딩이 가능하다. 하지만, 본 논문에서는 클래스 반사와 예외 처리를 이용하여 임의의 디렉토리 내 파일을 로딩 및 동적 실행할 수 있는 방법을 보이며 이 방법은 저자가 알기로는 기존에 알려지지 않은 방법이다. 이를 기반으로, 본 논문에서는 AES 암호와 동적 로딩을 이용하여, 모바일 어플리케이션의 내부 코드를 은폐하는 기법을 제안한다. 제안기법을 활용 시, 첫째 공격자의 입장에서는 내부 코드를 은폐하여 백신을 우회하는 악성코드 제작이 가능하고, 둘째, 프로그램 제작자의 입장에서는 핵심 알고리즘을 은폐하여 저작권을 보호하는 코드 제작이 가능하다. 안드로이드 버전 4.4.2(Kitkat)에서 프로토타입을 구현하여 제안 기법의 실효성을 보였다.

  • PDF

Influence of $Tb_4O_7$-Addition on Electrical Properties of $Pr_6O_{11}$-Based ZnO Varistors ($Pr_6O_{11}$계 ZnO 바리스터의 전기적 특성에 $Tb_4O_7$이 미치는 영향)

  • Yoo, Dea-Hoon;Park, Jong-Ah;Nahm, Choon-Woo;Seo, Hyung-Gwon
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.07a
    • /
    • pp.367-368
    • /
    • 2005
  • The microstructure and electrical properties of $Pr_6O_{11}$-based ZnO varistors consisting of Zn-Pr-Co-Cr-Tb oxides were investigated with $Tb_4O_7$ content in the range of 0.25~1.0 mol%. The varistor ceramics exhibited very high densification in the range of 5.74~5.83g/$cm^3$ with increasing $Tb_4O_7$ content. Furthermore, the incorporation of $Tb_4O_7$ in varistor ceramics $Tb_4O_7$greatly increased All of the characteristic parameters. As a result, It was found that $Tb_4O_7$-added varistors are good for high voltage field.

  • PDF

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 악성 안드로이드 모바일 앱의 최적특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.164-167
    • /
    • 2019
  • 모바일 운영체제 중 안드로이드의 점유율이 높아지면서 모바일 악성코드 위협은 대부분 안드로이드에서 발생하고 있다. 그러나 정상앱이나 악성앱이 진화하면서 권한 등의 단일 특징점으로 악성여부를 연구하는 방법은 유효성 문제가 발생하여 본 논문에서는 다양한 특징점 추출 및 기계학습을 활용하여 극복하고자 한다. 본 논문에서는 APK 파일에서 구동에 필요한 다섯 종류의 특징점들을 안드로가드라는 정적분석 툴을 통해 학습데이터의 특성을 추출한다. 또한 추출된 중요 특징점을 기반으로 모델링을 하는 세 가지 방법을 제시한다. 첫 번째 방법은 보안 전문가에 의해 엄선된 132가지의 특징점 조합을 바탕으로 모델링하는 것이다. 두 번째는 학습 데이터 7,000개의 앱에서 발생 빈도수가 높은 상위 99%인 8,004가지의 특징점들 중 랜덤포레스트 분류기를 이용하여 특성중요도가 가장 높은 300가지를 선정 후 모델링 하는 방법이다. 마지막 방법은 300가지의 특징점을 학습한 다수의 모델을 통합하여 하나의 가중치 투표 모델을 구성하는 방법이다. 최종적으로 가중치 투표 모델인 앙상블 알고리즘 모델을 사용하여 97퍼센트로 정확도가 개선되었고 오탐률도 1.6%로 성능이 개선되었다.

Implementation of AI-based Disaster Safety Communication Network protect (AI 기반 재난안전통신망 프로텍트 구현)

  • Bae, Se-jin;Ahn, Jung-hyun;Rhee, Jung-soo;Park, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.655-656
    • /
    • 2021
  • April 2021, Disaster Safety Communication Network services have been launched, but security functions are weak at the beginning of the service. The current security method for Android-based APP is using Google Protect's technology to detect malware. Malware is difficult to detect directly because there are various types, so by applying malware detection technology that combines AI and Google Protect technology to Disaster Safety Communication Networks, research on how to implement 'AI-based Disaster Satety Communication Network Protect'.

  • PDF

Electrical Properties and Stability of ZPCCD-Based Varistors with Sintering Time (소결시간에 따른 ZPCCD계 바리스터의 전기적 특성 및 안정성)

  • Nahm, Choon-Woo;Park, Jong-Ah;Yoo, Dea-Hoon;Suh, Hyoung-Kwon
    • Journal of the Korean Ceramic Society
    • /
    • v.42 no.7 s.278
    • /
    • pp.490-496
    • /
    • 2005
  • The electrical properties and stability of the varistors composed of ZnO-Pr$_{6}$O$_{11}$-CoO-Cr$_{2}$O$_{3}$-Dy$_{2}$O$_{3}$ system were investigated with sintering time in the range of 1$\~$3 h at 1350$^{\circ}C$ . As the sintering time was increased, the varistor voltage and leakage current increased, but the nonlinear exponent decreased. The varistors sintered for 1 h exhibited excellent nonlinearity, with a nonlinear exponent of 55.3 and a leakage current of 0.1 $\mu$A, whereas presented relatively low stability. The varistors sintered for 2 h exhibited not only high nonlinear exponent of 46.3, low leakage current of 0.3 $\mu$A, low dielectric dissipation factor of 0.0431, but also the highest stability, in which the variation rates of varistor voltage, nonlinear exponent, leakage current, dielectric constant, and dielectric dissipation factor were -3.0$\%$, -4.1$\%$, +3056.2$\%$, +5.1$\%$, and -12.5$\%$, respectively, after DC accelerated aging stress state of 0.95 V$_{1ma}$/150$^{\circ}C$/24 h. On the whole, the nonlinearity and stability of these varistors are greatly affected by the sintering time.

A Comprehensive Review of Tropical Milky White Mushroom (Calocybe indica P&C)

  • Subbiah, Krishnamoorthy Akkanna;Balan, Venkatesh
    • Mycobiology
    • /
    • v.43 no.3
    • /
    • pp.184-194
    • /
    • 2015
  • A compressive description of tropical milky white mushroom (Calocybe indica P&C var. APK2) is provided in this review. This mushroom variety was first identified in the eastern Indian state of West Bengal and can be cultivated on a wide variety of substrates, at a high temperature range ($30{\sim}38^{\circ}C$). However, no commercial cultivation was made until 1998. Krishnamoorthy 1997 rediscovered the fungus from Tamil Nadu, India and standardized the commercial production techniques for the first time in the world. This edible mushroom has a long shelf life (5~7 days) compared to other commercially available counterparts. A comprehensive and critical review on physiological and nutritional requirements viz., pH, temperature, carbon to nitrogen ratio, best carbon source, best nitrogen source, growth period, growth promoters for mycelia biomass production; substrate preparation; spawn inoculation; different supplementation and casing requirements to increase the yield of mushrooms has been outlined. Innovative and inexpensive methods developed to commercially cultivate milky white mushrooms on different lignocellulosic biomass is also described in this review. The composition profiles of milky white mushroom, its mineral contents and non-enzymatic antioxidants are provided in comparison with button mushroom (Agaricus bisporus) and oyster mushroom (Pleurotus ostreatus). Antioxidant assay results using methanol extract of milky white mushroom has been provided along with the information about the compounds that are responsible for flavor profile both in fresh and dry mushrooms. Milky white mushroom extracts are known to have anti-hyperglycemic effect and anti-lipid peroxidation effect. The advantage of growing at elevated temperature creates newer avenues to explore milky white mushroom cultivation economically around the world, especially, in humid tropical and sub-tropical zones. Because of its incomparable productivity and shelf life to any other cultivated mushrooms in the world, milky white mushroom could play an important role in satisfying the growing market demands for edible mushrooms in the near future.

Diversity and Antimicrobial Activity of Actinomycetes Isolated from Rhizosphere of Rice (Oryza sativa L.) (벼 근권에서 분리한 방선균의 다양성과 항균 활성)

  • Lee, Hye-Won;Ahn, Jae-Hyung;Weon, Hang-Yeon;Song, Jaekyeong;Kim, Byung-Yong
    • The Korean Journal of Pesticide Science
    • /
    • v.17 no.4
    • /
    • pp.371-378
    • /
    • 2013
  • Various microorganisms live in soil, of which those colonizing rhizosphere interact with nearby plants and tend to develop unique microbial communities. In this study, we isolated diverse actinomycetes from rhizosphere of rice (Oryza sativa L.) cultivated in fertilized (APK) and non-fertilized (NF) paddy soils, and investigated the diversity and antimicrobial activity of them. Using four kinds of selective media, 152 isolates were obtained from the soil samples and identified by determining 16S rRNA gene sequence. All of the isolates showed 99.0%~100.0% similarities with type strains and were classified into six genera: Dactylosporangium, Micromonospora, Kitasatospora, Promicromonospora, Streptomyces and Streptosporangium. Most of the isolates, 143 isolates, were classified into the genus Streptomyces. Additionally, many isolates had antimicrobial activity against plant pathogens, especially Magnaporthe oryzae (rice blast pathogen) in fungi. These findings demonstrated that rice rhizosphere can be a rich source of antagonistic actinomycetes producing diverse bioactive compounds.

Improving application startup time by automatic profiling (Automatic Usage Profiling을 통한 초기 앱 실행 속도 개선 방법)

  • Chae, Hyangseok;Baik, Jongmoon
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Google released an initial version of Android that runs Dex(Dalvik Executable) through the Dalvik Runtime. Since Dalvik Runtime is based on interpreter, JIT(Just-in-time) compilation has been applied to improve performance. After Lollipop(Android 5.0) Dalvik Runtime has replaced with ART Runtime which support AOT (Ahead-of-time) compilation of Dex into Native Code. The late st Android has a problem that the application execution speed is slow until the AOT compilation is completed according to the actual usage record after the installation of the app. To improve the problem we have investigate the characteristics of profile that can improve the execution speed of the application and generate the profile automatically. Finally we propose a method that can optimize the application at install time. With the proposed method we can optimize selectively at install time and can help improving the execution speed of the app from the initial execution.

Reliability Analysis of Privacy Policies Using Android Static Analysis (안드로이드 정적 분석을 활용한 개인정보 처리방침의 신뢰성 분석)

  • Yoonkyo, Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile app handles user data in a privacy policy. However, users are not certain that the privacy policy describes all the app's behavior. They have no choice but to rely on the privacy policy to confirm how the app uses data. This study designed a system that checks the reliability of privacy policies by analyzing the privacy policy texts and mobile apps. First, the system extracts and analyzes the privacy policy texts to check which personal data the privacy policy discloses that the mobile apps can collect. After analyzing which data apps can access using android static analysis, we compare both results to analyze the reliability of privacy policies. For the experiment, we collected the APK files and metadata of about 13K android apps registered in the Google Play Store and preprocessed the apps by four conditions. According to the comparison between privacy policies and mobile app behavior, many apps can access more personal data than disclosed in the privacy policy.