• Title/Summary/Keyword: Android applications

Search Result 418, Processing Time 0.029 seconds

A Design and Implementation of BukitList Location Share Applications Based on Android Platform (안드로이드 플랫폼 기반의 버킷리스트 장소 공유 어플리케이션 설계 및 개발)

  • Lee, Won Joo;Seo, Jung Hwan;Cha, Dae Yun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.119-120
    • /
    • 2019
  • 본 논문에서는 안드로이드 플랫폼 기반의 사용자 버킷리스트를 등록하고 다른 사용자들과 공유할 수 있는 어플리케이션을 설계하고 구현한다. 이 어플리케이션은 사용자 정보와 사용자 버킷리스트를 SQLite 데이터 베이스에 저장하고, 버킷리스트 등록 시 업로드 하는 이미지 파일은 FireBase에 별도로 저장한다. 그리고 지오코더를 이용하여 버킷리스트 장소 이름 혹은 주소에 해당하는 위도와 경도를 데이터베이스에 저장하고 다음 지도에 마커로 표시한다. 또한 카카오톡으로 지인들과 공유하며 버킷리스트를 실천할 장소를 다른 사용자들과 공유하도록 서비스 한다.

  • PDF

Analyzing Effectiveness of the Web Application Development in Smartphone (스마트폰상에서의 웹 응용프로그램 개발 효율성 분석)

  • Lee, Go-Eun;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.323-330
    • /
    • 2010
  • Due to the widespread smartphones and application stores, mobile application developments are now booming again in the same manner of PC history. The smartphone software development process, however, gives much inconvenience to developers because of the heterogeneous platform APIs and hardware incompatibility between different devices. To make clear these problems, mobile web applications are being accepted as an alternative to the native smartphone applications. Mobile web applications can be developed more simply and easily than native applications by using webkit engine's html, Java script, and CSS. Additionally developers can provide a platform-independent applications since web applications are going to run on web browsers. In this paper, we develop a personal applications store running on an android phone's browsers. We can accomplish this very simply by using webkit's various APIs such as OpenID. We can find out by implementing a real web application that development of web applications can surpass the native one in cost and time period without much loss of performance.

Design and Implementation of Java Crypto Provider for Android Platform (안드로이드 플랫폼을 위한 자바 보안 프로바이더 설계 및 구현)

  • Son, Mikyung;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.851-858
    • /
    • 2012
  • Java crypto library such as SUN JCA/JCE or BC JCE is generally used to implement secure applications for smart devices using Android platform. Programming functions written by Java language are launched and executed inside Java Virtual Machine (JVM), thereby difficult to use system hardware specific functionalities and degrading performance as well. In case of crypto primitive, few secure applications can use crypto primitive executing in JVM because both amount of computing and complexity of such primitives are very high. From the aspect of performance, in particular, time sensitive real time applications such as streaming services or secure application frequently applying public key based crypto algorithm cannot use Java crypto library. To solve the problem, we design and implement crypto library which employ JNI and NDK methods to directly access functions that implemented by native language such as C or C++. The proposed Java Crypto provider supports faster execution. Also developer can use our provider in the same way by writing traditional Java crypto library.

A Study on the attack technique using android UI events (안드로이드 UI 이벤트를 이용한 공격 기법 연구)

  • Yoon, Seok-Eon;Kim, Min-Sung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.603-613
    • /
    • 2015
  • Smart-phone Applications are consists of UI(User Interface). During using applications, UI events such as button click and scroll down are transmitted to Smart-phone system with many changes of UI. In these UI events, various information including user-input data are also involved. While Keylogging, which is a well-known user-input data acquisition technique, is needed a restrictive condition like rooting to obtain the user-input data in android environment, UI events have advantage which can be easily accessible to user-input data on user privileges. Although security solutions based keypad in several applications are applied, we demonstrate that these were exposed to vulnerability of application security and could be obtained user-input data using UI events regardless of presence of any security system. In this paper, we show the security threats related information disclosure using UI events and suggest the alternative countermeasures by showing the replay-attack example based scenarios.

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Morphing and Warping using Delaunay Triangulation in Android Platform (안드로이드 플랫폼에서 들로네 삼각망을 이용한 모핑 및 와핑 기법)

  • Hwang, Ki-Tae
    • Journal of Korea Game Society
    • /
    • v.10 no.6
    • /
    • pp.137-146
    • /
    • 2010
  • According to rapid advent of the smartphone, software technologies which have been used on PCs are being introduced into the smartphone. This paper introduces an implementation of an application software under the Android platform using morphing and warping technology. It composes two face images with morphing technology and also transforms an original face image using warping technology for fun. For this, the image is triangulated by Delaunay Triangulation based on control points which are created by simple LCD touches on the mobile device. The implementation case of this paper will be a good reference for the development of applications like games using morphing and warping technologies over Android platforms.

Avoiding Automatic Android App Analysis by Detecting Random Touch Generation (무작위 터치 발생 탐지를 이용한 안드로이드 앱 자동 분석 회피에 관한 연구)

  • Yun, Han Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.21-29
    • /
    • 2015
  • As the number of malicious Android applications increases rapidly, many automatic analysis systems are proposed. Hoping to trigger as many malicious behaviors as possible, the automatic analysis systems are adopting random touch generation modules. In this paper, we propose how to differentiate real human touches and randomly generated touches. Through experiments, we figured out that the distance between two consecutive human touches is shorter than that of random generation module. Also we found that the touch speed of human is also limited. In addition, humans rarely touch the outer area of smartphone screen. By using statistics of human smartphone touch, we developed an algorithm to differentiate between human touches and randomly generated touches. We hope this research will help enhance automatic Android app analysis systems.