• Title/Summary/Keyword: Android application (app)

Search Result 137, Processing Time 0.029 seconds

A Comparative Study For Mobile HybridApp Development Tool (모바일 하이브리드앱 개발도구에 관한 비교연구)

  • Jang, Rae-Young;Jung, Sung-Jae;Bae, Yu-Mi;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.429-432
    • /
    • 2012
  • Mobile devices diffusion begins by the iPhone and spreads by the Android. A widely used mobile devices is Smartphone(iPhone, Android, Bada, WindowPhone7, BlackBerry, etc) and Tablet(iPad, Android). In the past, we have developed a dedicated application for device. But, Now we must develop a application by considering the characteristics of the operating system. Accordingly, many problems occurred and other developmet methods have emerged. In this paper, we learn about MobileHybridApp development tool-oriented One Source Multi Use-and compare the differences, propose a method to develop context-sensitive.

  • PDF

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

A Design and Implementation of Prototype of Dual Screen Platform on Android (듀얼 스크린 안드로이드 플랫폼 프로토타입의 설계 및 구현)

  • Hwang, Ki-Tae;Cho, Hye-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.163-169
    • /
    • 2012
  • Since only one application has monopoly on LCD device of the mobile device in Android platform, the user can not see two screens together displayed by two applications running simultaneously. In this paper, a dual-app has been defined as two mobile applications running on each device of a pair of two mobile devices and DSAP or Dual Screen Android Platform has been implemented. DSAP does remote-execution of the peer application of a dual-app on the peer mobile device when either application of the dual-app starts to run and supports communication of the pair app over the network. This paper describes details of design and implementation of DSAP and shows a sample case utilizing DSAP.

A Study on Providing Information on Customized Styling Using an Android Application (안드로이드 앱을 이용한 맞춤형 스타일링 정보제공 연구)

  • Park, Sangil;Seo, Kyeongwon;Kim, Minsuk;Koo, Minjeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.35-40
    • /
    • 2016
  • This study is about developing an Android application that provides information on customized styling and the app was made to offer assistance in coordinating users' clothing. It keeps the record on clothing items users wore and uses it as coordination information, and prepares styling by referring to user-specific clothing management data. The photos can taken during shopping or can be taken from smart phone gallery, and the images searched through Daum OpenAPI can be saves in the app. Using the saved photos of items and clothes that were previously worn, the app provides styling recommendations.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Detecting Repackaged Applications using the Information of App Installation in Android Smartphones (안드로이드 스마트폰에서 앱 설치 정보를 이용한 리패키징 앱 탐지 기법)

  • Joun, Young Nam;Ahn, Woo Hyun
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • In recently years, repackaged malwares are becoming increased rapidly in Android smartphones. The repackaging is a technique to disassemble an app in a market, modify its source code, and then re-assemble the code, so that it is commonly used to make malwares by inserting malicious code in an app. However, it is impossible to collect all the apps in many android markets including too many apps. To solve the problem, we propose RePAD (RePackaged App Detector) scheme that is composed of a client and a remote server. In the smartphone-side, the client extracts the information of an app with low CPU overhead when a user installs the app. The remote server analyzes the information to decide whether the app is repackaged or not. Thus, the scheme reduces the time and cost to decide whether apps are repackaged. For the experiments, the client and server are implemented as an app on Galaxy TAB and PC respectively. We indicated that seven pairs of apps among ones collected in official and unofficial market are repackaged. Furthermore, RePAD only increases the average of CPU overhead of 1.9% and the maximum memory usage of 3.5 MB in Galaxy TAB.

A Modeling Technique for Development of Mobile App. based on Android (안드로이드 기반의 모바일 앱 개발을 위한 모델링 기법)

  • Cho, Eun-Sook;Kim, Chul-Jin;Lee, Sook-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.8
    • /
    • pp.3999-4005
    • /
    • 2013
  • We forecast that the scale of mobile market will be large scale according to the twenty million times of smart phone's user is arrived. The type of software development is being transferred into mobile-based App. or cloud computing-based service from web-based software. Currently both Google's android and Apple's IOS are known for two prominent platforms. Existing modeling techniques cannot be applied into the case of mobile application which is executed those platforms. Therefore, we suggest a modeling technique that is customized existing modeling techniques into android-based software development. That is, we propose an analysis and design techniques which are needed into android-based mobile smart environment.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.