• Title/Summary/Keyword: Android APP

Search Result 330, Processing Time 0.021 seconds

Design and Implementation of a Tag-based Object Location Tracking and Sharing System

  • Kyungyoung, Kang;Huhnkuk, Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.63-68
    • /
    • 2023
  • In this paper, we introduce a system that tracks and shares the position of objects based on tags. After receiving the location information of objects through the tag location tracking app, the location of the tag is shared as a group, and the shared users also check the location of objects in real time. Our system offer a differentiated function that allows multiple users to manage and supervise the location of objects, compared to legacy systems. The GPS module and Bluetooth are connected to the Arduino board to obtain the location information of the tag and check it through the Android app. We used Android Studio to create app, and the tag brings up the location of the object. The location of the tag is stored in the phpMyadmin DB and the latitude/longitude is received to the Android app and displayed on the map of the app. The proposed system will be useful for loss prevention and managing public goods.

An Examination of an Efficient UI of Smartphone Home Screen Structure (스마트폰의 홈 화면구조에 따른 효율적 UI 방안 모색)

  • Choi, Jinhae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.36 no.5
    • /
    • pp.437-446
    • /
    • 2017
  • Objective: This study aims to draw an efficient UI design by comparing the usability of App drawer and single-layered home screens, which are smartphone home screens. Background: Because smartphone home screen is frequently used including the installation, deletion, and editing of APPs, it should be designed with easily controllable information structure. There is a need to seek a user-friendly UI by comparing the usability of App drawer and single-layered home screens, of which methods to search Apps are different. There is also a need to examine an efficient UI and the factors to improve from the user perspective. Method: This study targeted 30 Android OS and iOS users to evaluate the App drawer and single-layered home screens, of which UI structures are different. Each participant was instructed to carry out an App searching task and App deleting task, and the execution time and the number of errors were measured. After the tasks were completed, they evaluated satisfaction through a questionnaire survey. Results: In the App searching task with low task level, there was no difference in execution level between the App drawer and single-layered home screens. However, the single-layered home screen showed higher efficiency and accuracy in the App deleting task with high task level. As for the group difference according to use experience, there was no difference in satisfaction among Android OS users, but iOS user satisfaction with single-layered home screen with which they were familiar was higher. Conclusion: As for home screen usability, the single-layered home screen UI structure can be advantageous, as task level is higher. Repulsion was higher, when users, who had used easier UI, used complex UI in comparison with user satisfaction, when users familiar with complex UI used easier UI. A UI indicating the current status with clear label marking through a task flow chart-based analysis, and a UI in which a user can immediately recognize by exposing hidden functions to the first depth were revealed as things to improve. Application: The results of this study are expected to be used as reference data in designing smartphone home screens. Especially, when iOS users use Android OS, the results are presumed to contribute to the reduction of predicted barriers.

Android App. Implementation Teaching using App. Inventor for Elementary school students (초등학생을 대상으로 앱 인벤터를 활용한 안드로이드용 앱 제작교육)

  • Rim, Hwakyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1495-1507
    • /
    • 2013
  • Smart device appeared as IT technology develops and it caused the proliferation of digital contents. It is because that App technology supports to install and use the contents in the smart device easily. App is developed by the creativity and the programming skill and the commercial value is generated in the process of development. In this paper, we taught how to develop APP to elementary school students by Android App Inventor program and observed the changes of their thinking through reflection-note which describes thinking of them. This research was carried out for 28 elementary school students, 5th and 6th grade. We found the attitude that students try to solve problem actively with the high interest. They enjoy showing developed App to others easily and quickly, which is the characteristic of smart devices. We also found a phenomenon that the students consider commercial value.

POMDP Based Trustworthy Android App Recommendation Services (부분적 관찰정보기반 견고한 안드로이드 앱 추천 기법)

  • Oh, Hayoung;Goo, EunHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1499-1506
    • /
    • 2017
  • The use of smartphones and the launch of various apps have increased exponentially, and malicious apps have also increased. Existing app recommendation systems have been limited to operate based on static information analysis such as ratings, comments, and popularity categories of other users who are online. In this paper, we first propose a robust app recommendation system that realistically uses dynamic information of apps actually used in smartphone and considers static information and dynamic information at the same time. In other words, this paper proposes a robust Android app recommendation system by partially reflecting the time of the app, the frequency of use of the app, the interaction between the app and the app, and the number of contact with the Android kernel. As a result of the performance evaluation, the proposed method proved to be a robust and efficient app recommendation system.

A Strengthened Android Signature Management Method

  • Cho, Taenam;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1210-1230
    • /
    • 2015
  • Android is the world's most utilized smartphone OS which consequently, also makes it an attractive target for attackers. The most representative method of hacking used against Android apps is known as repackaging. This attack method requires extensive knowledge about reverse engineering in order to modify and insert malicious codes into the original app. However, there exists an easier way which circumvents the limiting obstacle of the reverse engineering. We have discovered a method of exploiting the Android code-signing process in order to mount a malware as an example. We also propose a countermeasure to prevent this attack. In addition, as a proof-of-concept, we tested a malicious code based on our attack technique on a sample app and improved the java libraries related to code-signing/verification reflecting our countermeasure.

A Scheme of Motor Control for Linux-based Quadcopter with Android Phone (안드로이드 폰을 이용한 리눅스 기반 쿼드콥터의 모터 제어 기법)

  • Rim, Seong-Rak;Kim, Du-Kyu
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.379-387
    • /
    • 2013
  • This paper describes a scheme of motor control for Quadcopter with Android phone instead of a dedicated controller. Basically, user's requests (channel and speed) are inquired and transferred to the Quadcopter with Android phone, then the embedded Linux system receives them and controls the motor speed of corresponding channel. We have designed and implemented an App. for user interface and the modules of device driver and timer ISR for the motor control. Finally, we have up-loaded the App. and the modules to an Android (ver.4.0) phone and ARM processor (S3C6410)-based embedded board respectively, and reviewed the functional correctness by testing the motor control of Quadcopter.

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

A String Analysis based System for Classifying Android Apps Accessing Harmful Sites (유해 사이트를 접속하는 안드로이드 앱을 문자열 분석으로 검사하는 시스템)

  • Choi, Kwang-Hoon;Ko, Kwang-Man;Park, Hee-Wan;Youn, Jong-Hee
    • The KIPS Transactions:PartA
    • /
    • v.19A no.4
    • /
    • pp.187-194
    • /
    • 2012
  • This paper proposes a string analysis based system for classifying Android Apps that may access so called harmful sites, and shows an experiment result for real Android apps on the market. The system first transforms Android App binary codes into Java byte codes, it performs string analysis to compute a set of strings at all program points, and it classifies the Android App as bad ones if the computed set contains URLs that are classified because the sites provide inappropriate contents. In the proposed approach, the system performs such a classification in the stage of distribution before installing and executing the Apps. Furthermore, the system is suitable for the automatic management of Android Apps in the market. The proposed system can be combined with the existing methods using DNS servers or monitoring modules to identify harmful Android apps better in different stages.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.