• Title/Summary/Keyword: Adobe Flash Player

Search Result 4, Processing Time 0.018 seconds

A Study on Flash Mobile Game Application Using Adobe AIR (어도비 에어를 이용한 플래시 모바일 게임 애플리케이션에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Korea Game Society
    • /
    • v.15 no.2
    • /
    • pp.73-82
    • /
    • 2015
  • This study makes a proposal about Flash mobile game applications using Adobe AIR. In developing a mobile game, the developer programs in Flash ActionScript, and distributes and publishes the program using Adobe AIR so that the game can be played on an Android mobile device. In order to run the game, the player downloads and installs Android Adobe AIR onto the mobile device and sets up the published app. This study designed and implemented a mobile game application and showed that a mobile game is executed on a smart phone. This outcome may be applicable to various genres of apps. Moreover, this study analyzed the trends of mobile games, focusing on their genres and characteristics, and according to the results, most of them were mobile games using Kakao Talk. The analysis results also showed that the popularity ranking of games varied little among sites.

A Study on Artifact Grouping by Analyzing Artifact Case by Vulnerability : Using Adobe Flash Player Vulnerabilities (취약점 별 아티팩트 사례 분석을 통한 아티팩트 그룹핑 연구 : 어도비 플래시 플레이어 취약점을 이용하여)

  • Song, ByungKwan;Kim, SeonKwang;Kwon, EunJin;Jin, SeungTaek;Kim, JongHyuk;Kim, HyeongCheol;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.87-95
    • /
    • 2019
  • The damage is increasing due to many encroachment accidents caused by increasingly sophisticated cyber attacks. Many institutions and businesses lack early response to invest a lot of resources in the infrastructure for incident detection. The initial response of an intrusion is to identify the route of attack, and many cyber attacks are targeted at software vulnerabilities. Therefore, analyzing the artifacts of a Windows system against software vulnerabilities and classifying the analyzed data can be utilized for rapid initial response. Therefore, the remaining artifacts upon entry of attacks by software are classified, and artifact grouping is presented for use in analysis of encroachment accidents.

A Study on the Awareness of Open Source Security Vulnerabilities (공개 오픈소스의 보안 취약성에 대한 학부생의 인식조사 연구)

  • Kang, TaeIm;Choi, ChangBin;Kim, GaYeon;Lee, TaeHyeon;Lee, GyeongHo;Cho, Sena;Jang, YoungSu
    • Annual Conference of KIPS
    • /
    • 2018.05a
    • /
    • pp.131-132
    • /
    • 2018
  • 오픈소스는 소스코드를 무료로 공개하여 누구나 쉽게 사용하고 공유 할 수 있도록 만든 소프트웨어 이다. 누구나 열람할 수 있는 오픈소스의 특성상 보안에 취약하고 소프트웨어의 구조적 오류가 발생 할 수 있다. 필요한 기능을 손쉽고 편리하게 사용할 수 있다는 장점이 있지만, 검증되지 오픈소스는 해커와 같은 외부 공격에 취약점을 노출시킬 수 있다. 본 논문에서는 이러한 오픈소스의 취약점을 Adobe Flash Player의 사례를 통해 알아보고 취약점 해결방안을 고찰해 봄으로써 오픈소스를 사용하면서 발생할 수 있는 문제점을 보완하고자 하였다.

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF