• Title/Summary/Keyword: Android applications

Search Result 418, Processing Time 0.024 seconds

Development of a Meeting Android Application Based on Real-Time Remote Screen Control (실시간 원격화면 제어 기반의 회의 지원 안드로이드 앱 개발)

  • Jung, Jae Yoon;Kim, Tae-Hwa;Jung, Hyun-Woo;Lee, Ji-Hoon;Kim, Dong Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.411-413
    • /
    • 2012
  • It is noticeable that the number of newly registered Android applications increases rapidly. Such a recent trend indicates the Android platform is spreading globally. The ongoing platform upgrade might be one of the main reasons of the popularity of the Android mobile platform. Android platform 4.0 or later provides WiFi-Direct APIs that allow smart devices to communicate with each other without intermediate media. In this paper, we propose design and implementation techniques for small-scale impromptu meeting applications based on WiFi-Direct. The proposed meeting application can be used in a situation when one is difficult to connect the Internet. It also provides meeting data sharing capabilities, noting functionality, real-time remote screen control, and grouping of meeting participants. Our development results have demonstrated that the Android WiFi-Direct APIs can be effectively applied to impromptu conferencing mobile applications.

  • PDF

Software Architecture Recovery for Android Application Reuse (안드로이드 어플리케이션의 재사용을 위한 소프트웨어 아키텍처 생성)

  • Park, Jin-Soo;Kwon, Jang-Jin;Hong, Jang-Eui;Choi, Min
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.9-17
    • /
    • 2013
  • Android applications market has increased rapidly due to the popularity of smart phones. In order to high competitiveness in the application market should be high productivity, reduce cost. And short development cycle is required because of increased the android applications demand. Owing to develop applications in short time, the requirements analysis, design process are able to omitted. But in the case of reuse application at development phase, involved many problems because omit document or design. so target of this paper is android application source code that omit document or design. we propose architecture recovery techniques from android application source code by reverse engineering with identify functions are reused. We expect that increase productivity and reduce development cost, smooth maintain by proposed technique.

  • PDF

A Trace-based Precompile Method for Improving the Response Times of Android Applications (안드로이드 응용의 응답 시간 향상을 위한 트레이스 기반 프리컴파일 기법)

  • Hong, Sunggil;Kim, Kanghee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.231-236
    • /
    • 2013
  • Recently, to improve the user response times of Android applications, several studies have been proposed to combine the idea of Ahead-of-Time compilation into Dalvik virtual machine, which uses Just-in-Time compilation. The studies, however, require modifications of the Dalvik executables of target applications, thus are difficult to be adopted for legacy applications already deployed. This paper proposes a JITwP(JIT with Precompile) technique that precompiles hot traces at application launch time with no modification of the Dalvik executable. It improves the user response times of target applications by providing precompile hints prepared offline. Our experimental results demonstrate a 4% improvement in terms of execution time for the Web browser application.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.

Efficient Malware Detector for Android Devices (안드로이드 모바일 단말기를 위한 효율적인 악성앱 감지법)

  • Lee, Hye Lim;Jang, Soohee;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.617-624
    • /
    • 2014
  • Smart phone usage has increased exponentially and open source based Android OS occupy significant market share. However, various malicious applications that use the characteristic of Android threaten users. In this paper, we construct an efficient malicious application detector by using the principle component analysis and the incremental k nearest neighbor algorithm, which consider an required permission, of Android applications. The cross validation is exploited in order to find a critical parameter of the algorithm. For the performance evaluation of our approach, we simulate a real data set of Contagio Mobile.

An Android Birthmark based on API k-gram (API k-gram 기반의 안드로이드 버스마크)

  • Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.177-180
    • /
    • 2013
  • A software birthmark means inherent characteristics that can be used to identify a program. Because the software birthmark is difficult to remove by simple program transformation, it can be used to detect code theft. In this paper, we propose a birthmark technique based on API k-gram of Android applications. Android SDK provides various libraries that help programmers to develop application easily. In order to use Android SDK, we have to use API method calls. The API call instructions are hard to be replaced or removed, so they can be a inherent characteristics of an application. To show the effectiveness of the proposed birthmark, we compared it with previous birthmarks and evaluated it with open source applications. From the experiments, we verified that the credibility and resilience of our birthmark is higher than previous birthmarks.

Design of Music Player Application System based on Android (안드로이드 기반의 뮤직 플레이어 어플리케이션 시스템 설계)

  • Ryu, Chang-Su;Lee, Myung-Hwan;Hur, Chang-Wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1237-1242
    • /
    • 2014
  • The functions of playing musics and multimedia have become essential in one device as a smart phone since the smart phone appeared. It is very convenient, but it contains controversial arguments about sound quality, so many smart phone users use the music player application. By using these music applications, people start to think about the relationship between music playing and sound quality. However, those applications are not perfect, so it is hard to choose a good application. This thesis is about the advantages of the sound quality of music player applications that are currently sold in Android Market through RightMark Audio Analyzer program, and plans to suggest android music player application system design by analyzing applications by covering disadvantages of these applications.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.