• Title/Summary/Keyword: Android applications

Search Result 418, Processing Time 0.024 seconds

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

WhoAmI: Personal Information Sharing Application over WiFi and WiFi Direct (WhoAmI: 와이파이와 와이파이 다이렉트 환경에서의 개인정보 공유 어플리케이션)

  • Kwak, Jun-Seok;Park, Jongmoon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.371-378
    • /
    • 2014
  • As people are taking part in more versatile social activities, it becomes more frequent and more important for people to share personal information each other in appropriate level. Unfortunately, although the rapid spread of smart devices and advance of network technologies have brought many applications for information sharing into our hands, they do not provide effective mechanism for sharing personal information on collocated people. In this paper, we introduce an android application named WhoAmI which provides the functionality of sharing personal information on nearby users over Wi-Fi Direct as well as Wi-Fi network environment. According to the predefined access level such as business, community or friend, WhoAmI naturally provides profile information to accessible users. In addition, the information such as music, photo, movie can be effectively shared through the application.

Implementation of an Android MIDI Player that Supports DRM for Musical Instrument Practice (DRM을 지원하는 악기 연습용 안드로이드 MIDI 재생기 구현)

  • Kim, Daseul;Kim, Seungha;Ko, Eunbyul;Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.275-282
    • /
    • 2015
  • The Musical Instrument Digital Interface (MIDI) file format is a typical format for dynamic music that can be used not only for playing, but also for supporting dynamic music activity, such as musical instrument practice. However, almost all of the existing MIDI applications focus only on the playing features. In this paper, therefore, we implement a MIDI file play application that supports various dynamic features such as part-play repeating certain sections that the user wants, tone and speed control while playing a MIDI file, downloading MIDI files from a server, and lastly Digital Rights Management (DRM). By supporting these features, we are confident that our MIDI application will help users who wish to practice musical instruments to do so conveniently, while effectively protecting the copyright of their purchased MIDI files.

A Mobile Voting DApp Implementation and Security Issues (모바일 투표 Dapp 실행 및 보안 이슈)

  • KHERLEN, NARANTUYA;Park, Jun Beom;Park, Jong Sou
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.290-292
    • /
    • 2019
  • Since the advent of blockchain and bitcoin, decentralization has been accelerating around the world as a public blockchain ethereum with smartcontract has begun. Developers can use Ethereum's blockchain development platform to develop "distributed applications" (DApp) running on a decentralized P2P network, and various types of devices from IoT to mobile can participate in a block-chain distributed environment have. Using Ethereum's blockchain development platform, developers can develop "Decentralized Application (DApp)" that run on a decentralized P2P network and various types of devices from IOT to mobile can participate in distributed blockchain environments. There are many ways to interact with the blockchain and the smart contract, but users tend to prefer the mobile methods due to their convenience and accessibility advantages. Therefore, the author developed an Android based voting DApp and researched related issues. Since the current development methods of DApp are not adequately researched and standardized, efficient methods for developing user-friendly DApp were studied. Because DApp has to spend a certain amount of fees to interact with blockchain, it has intensively investigated the gas problem of Smart Contract code and the security problem of code, and author would like to introduce it in this paper.

  • PDF

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

User Experience Factors in Connected Car Infotainment Applications : Focusing on Text Mining Analysis in the Android Auto Reviews (커넥티드카 인포테인먼트 애플리케이션의 사용자 경험 요인 : 안드로이드 오토 리뷰의 텍스트마이닝 분석을 중심으로)

  • Jung Yong Kim;Su-Eun Bae;Junho Choi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.211-225
    • /
    • 2023
  • In the future, infotainment systems are expected to play a pivotal role in mobility ecosystems connecting users and vehicles. This study draws user-experience factors from reviews of Android Auto, a car infotainment application, and analyzes factors that affect satisfaction. The user-experience factors of infotainment have been redefined based on previous studies. To analyze actual user-experience factors, topics are obtained, applied, and interpreted from user discourse through topic modeling. Sentiment analysis and logistic regression are used to determine positive and negative user-experience factors that affect satisfaction. Results of the empirical analysis show that Ease of Use and Understandability are factors that have the greatest impact on satisfaction, and Flexibility, Safety, and Playfulness are factors that have the most critical effect on dissatisfaction. Therefore, this paper suggests ways to improve the satisfaction level of the infotainment system, and establishes a strategy accordingly.

RACC: A Reliable Android Applications Execution Method against Reverse-engineering Attacks using Remote Class (RACC: 원격 클래스 호출을 통한 안드로이드 애플리케이션 역공학 공격 방지)

  • Lim, Ji-Hyeog;Lee, Chan-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.116-118
    • /
    • 2012
  • 안드로이드 앱 시장이 활성화되면서, 안드로이드 앱의 불법복제나 역공학 공격으로 인한 피해가 증가하고 있다. 앱 불법복제는 앱 판매 수익의 저하뿐만 아니라 개발자의 의지를 뺏고 개발 노력에 대해 상대적 박탈감을 주게 된다. 자바 프로그램의 경우 역공학으로 인해 바이트 코드에 존재하는 핵심 알고리즘이 쉽게 노출되어 지적재산권이 유출될 수 있다는 점에서 개발자나 개발사에게 심각한 위협이 되고 있다. 본 논문에서는 안드로이드 환경에서 앱에 대한 역공학 공격의 위협을 보이고, 역공학 방지 기법인 RACC를 제안한다. RACC는 보호할 핵심 클래스를 앱으로 부터 추출하여 바이트 코드 형태로 안전한 원격 서버에 관리하여 수행하며, 스마트폰(클라이언트)에는 저장하지 않는다. 스마트폰 앱이 해당 핵심 클래스를 호출하면, 그 호출이 원격 서버로 전송되어 수행된 후 결과가 스마트폰에 반환된다. 이처럼 핵심 클래스 코드가 클라이언트에 직접 노출 없이 원격지에서 관리되고 수행됨으로써 역공학 공격을 원천적으로 방지한다.

Detecting Collaborative Privacy Information Leaks on Android Applications (안드로이드 애플리케이션의 협력적인 개인 정보 유출 탐지)

  • Jeon, Cheol;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.92-94
    • /
    • 2012
  • 안드로이드 운영체제는 애플리케이션들이 서로의 코드와 데이터를 공유할 수 있도록 애플리케이션 컴포넌트간의 통신을 지원한다. 또한 보안을 위해 컴포넌트간의 통신을 엄격하게 제어하기 위한 퍼미션을 제공한다. 하지만 개발자의 보안의식 부재에 따른 퍼미션의 잘못된 사용은 애플리케이션 컴포넌트를 노출시켜 검증되지 않은 애플리케이션이 코드와 데이터에 접근할 수 있게 만드는 문제를 야기할 수 있다. 특히, 노출된 컨텐트 프로바이더(content provider)는 악성 애플리케이션이 기존 탐지 툴을 회피하여 개인정보를 임시로 보관하는 저장소로 악용될 수 있다. 따라서 하나의 애플리케이션만을 분석하는 기존 탐지 툴로는 이와 같이 협력적으로 동작하는 악성 애플리케이션을 탐지 할 수 없다. 본 논문에서는 노출된 컨텐트 프로바이더를 이용한 협력적 개인정보 유출 공격 시나리오를 제시하고 이를 탐지하기 위한 기법을 제안한다. 제안한 기법을 토대로 만든 탐지 툴 사용해 총 189개의 안드로이드 애플리케이션을 분석하였고 그 결과로 컨텐트 프로바이더를 노출시킨 32개의 애플리케이션과 개인정보를 유출할 가능성이 있는 애플리케이션 4개를 탐지하였다.

Indoor Gas Monitoring System Using Smart Phone Application (스마트폰 어플리케이션을 이용한 실내 가스 모니터링 시스템)

  • Choi, Sung-Yeol;Choi, Jang-Sik;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.49-54
    • /
    • 2012
  • Special applications designed for smart phone, so called "Apps" are rapidly emerging as unique and effective sources of environmental monitoring tools. Using the advantages of Information and Communication Technology (ICT), this paper propose an application that provides Indoor Gas Monitoring System. In this paper, use four wireless gas sensor modules to acquire sensors data wirelessly coupled with the advantages of existing portable smart device based on Android platform to display the real-time data from the sensor modules. Additionally, this paper adapts a simple gas classification algorithm to inform in-door Gas for users real-time based.

Prenatal Applications for Android (태교 애플리케이션 설계 방안)

  • Kim, Jin-Ri;Kim, Bo-Hee;Kang, Seok-Won;Kim, Seok-Hoon;Ryoo, In-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.166-168
    • /
    • 2012
  • 스마트폰의 높은 접근성으로 인하여 사람들의 관심이 많아졌다. 또한 태아의 발달과 순산을 위한 태교의 중요성이 갈수록 놓아지고 있다. 이러한 스마트폰의 접근성을 이용하여 효과적인 태교를 산모들에게 제공하고 기존의 한가지 기능에만 충실한 태교 애플리케이션의 문제점을 해결하며 나아가 태교 운동을 제공하는 새로운 애플리케이션이 필요하다. 태교 애플리케이션의 주요 기능은 1) 태교에 관한 정보를 제공하고, 2) 산모가 태교 일기를 쉽게 쓰고 관리할 수 있게 하며, 3) 음악 재생 기능을 통해 산모에게 유익한 태교 음악을 제공한다. 또한 4) 산모가 임신 중에 할 수 있는 운동에 대한 정보와 안드로이드에서 지원하는 센서를 통해 산모의 움직임을 인식하여 운동을 할 수 있는 기능을 제공한다. 결과적으로 태교 애플리케이션은 산모에게 효과적으로 태교 정보를 제공하고 정서적, 신체적인 측면에 있어서 올바른 태교방법을 제시 할 수 있다.