• 제목/요약/키워드: Android security

검색결과 290건 처리시간 0.021초

Healthcare and Emergency Response Service Platform Based on Android Smartphone

  • Choi, Hoan-Suk;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • 제16권1호
    • /
    • pp.75-86
    • /
    • 2020
  • As the elderly population is becoming an aging society, the elderly are experiencing many problems. Social security costs for the elderly are increasing and the un-linked social phenomenon is emerging. Thus, the social infrastructure and welfare system established in the past economic growth period are in danger of not functioning properly. People socially isolated or with chronic diseases among the elderly are exposed to various accidents. Thus, an active healthcare management service is imperative. Additionally, in the event of a dangerous situation, the system must have ways to notify guardians (family or medical personnel) regarding appropriate action. Thus, in this paper, we propose the smartphone-based healthcare and emergency response service platform. The proposed service platform aggregates movement of relevant data in real-time using a smartphone. Based on aggregated data, it will always recognize the user's movements and current state using the human motion recognition mechanism. Thus, the proposed service platform provides real-time status monitoring, activity reports, a health calendar, location-based hospital information, emergency situation detection, and cloud messaging server-based efficient notification to several subscribers such as family, guardians, and medical personnel. Through this service, users or guardians can augment the level of care for the elderly through the reports. Also, if an emergency situation is detected, the system immediately informs guardians so as to minimize the risk through immediate response.

An image analysis system Design using Arduino sensor and feature point extraction algorithm to prevent intrusion

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • 한국인공지능학회지
    • /
    • 제9권2호
    • /
    • pp.23-28
    • /
    • 2021
  • In this paper, we studied a system that can efficiently build security management for single-person households using Arduino, ESP32-CAM and PIR sensors, and proposed an Android app with an internet connection. The ESP32-CAM is an Arduino compatible board that supports both Wi-Fi, Bluetooth, and cameras using an ESP32-based processor. The PCB on-board antenna may be used independently, and the sensitivity may be expanded by separately connecting the external antenna. This system has implemented an Arduino-based Unauthorized intrusion system that can significantly help prevent crimes in single-person households using the combination of PIR sensors, Arduino devices, and smartphones. unauthorized intrusion system, showing the connection between Arduino Uno and ESP32-CAM and with smartphone applications. Recently, if daily quarantine is underway around us and it is necessary to verify the identity of visitors, it is expected that it will help maintain a safety net if this system is applied for the purpose of facial recognition and restricting some access. This technology is widely used to verify that the characters in the two images entered into the system are the same or to determine who the characters in the images are most similar to among those previously stored in the internal database. There is an advantage that it may be implemented in a low-power, low-cost environment through image recognition, comparison, feature point extraction, and comparison.

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Digitalization of Seafarer's Book for Authentication and e-Navigation

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Information Processing Systems
    • /
    • 제15권1호
    • /
    • pp.217-232
    • /
    • 2019
  • Currently, the crew working on a ship is required to carry a seafarer's book in most countries around the world, including the Republic of Korea (ROK). Yet, many fishermen working in the international waters of the ROK do not abide by this rule as the procedure of obtaining it is rather inconvenient or they do not understand the necessity or the benefits of having it. Also, as the regulation of carrying the certificate has been strengthened, it is important for them to avoid making a criminal record unintentionally. This study discusses the digitalization of the seafarer's book based on several security measures in addition to BLE Beacon-based positioning technology, which can be useful for the e-Navigation. Normally, seamen's certificates are recorded by the captain, medical institution, or issuing authority and then kept in an onboard safe or a certificate cabinet. The material of the certificates is a cloth that can withstand salinity as the certificate could be contaminated by mold. In the past, the captains and their crews were uncooperative when the ROK's maritime police tried to inspect several ships simultaneously because of the time and cost involved. Thus, a system with which the maritime police will be able to conveniently manage the crews is proposed.

The Design, Implementation, Demonstration of the Architecture, Service Framework, and Applications for a Connected Car

  • Kook, Joongjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.637-657
    • /
    • 2021
  • While the conventional vehicle's Head-Units played relatively simple roles (e.g., control of heating ventilation and air conditioning, the radio reception), they have been evolving into vehicle-driver interface with the advent of the concept of Connected Car on top of a rapid development of ICT technology. The Head-Unit is now successfully extended as an IVI (In Vehicle Infotainment) that can operate various functions on multimedia, navigation, information with regards to vehicle's parts (e.g. air pressure, oil gauge, etc.). In this paper, we propose a platform architecture for IVI devices required to achieve the goal as a connected car. Connected car platform (CoCaP) consists of vehicle selective gateway (VSG) for receiving and controlling data from major components of a vehicle, application framework including native and web APIs required to request VSG functionality from outside, and service framework for driver assistance. CoCaP is implemented using Tizen IVI and Android on hardware platforms manufactured for IVI such as Nexcom's VTC1010 and Freescale's i.MX6q/dl, respectively. For more practical verification, CoCaP platform was applied to an real-world finished vehicle. And it was confirmed the vehicle's main components could be controlled using various devices. In addition, by deriving several services for driver assistance and developing them based on CoCaP, this platform is expected to be available in various ways in connected car and ITS environments.

State of the Art of Anti-Screen Capture Protection Techniques

  • Lee, Young;Hahn, SangGeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1871-1890
    • /
    • 2021
  • The transition toward a contactless society has been rapidly progressing owing to the recent COVID-19 pandemic. As a result, the IT environment of organizations and enterprises is changing rapidly; in particular, data security is expanding to the private sector. To adapt to these changes, organizations and companies have started to securely transfer confidential data to residential PCs and personally owned devices of employees working from home or from other locations. Therefore, organizations and companies are introducing streaming data services, such as the virtual desktop infrastructure (VDI) or cloud services, to securely connect internal and external networks. These methods have the advantage of providing data without the need to download to a third terminal; however, while the data are being streamed, attacks such as screen shooting or capturing are performed. Therefore, there is an increasing interest in prevention techniques against screen capture threats that may occur in a contactless environment. In this study, we analyze possible screen capture methods in a PC and a mobile phone environment and present techniques that can protect the screens against specific attack methods. The detection and defense for screen capture of PC applications on Windows OS and Mac OS could be solved with a single agent using our proposed techniques. Screen capture of mobile devices can be prevented by applying our proposed techniques on Android and iOS.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.

Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구 (Android Malware Analysis Technology Research Based on Naive Bayes)

  • 황준호;이태진
    • 정보보호학회논문지
    • /
    • 제27권5호
    • /
    • pp.1087-1097
    • /
    • 2017
  • 스마트 폰의 보급률이 증가함에 따라 스마트 폰을 대상으로 하는 악성코드들이 증가하고 있다. 360 Security의 스마트 폰 악성코드 통계에 따르면 2015년 4분기에 비해 2016년 1분기에 악성코드가 437% 증가하는 수치를 보였다. 특히 이러한 스마트 폰 악성코드 유포의 주요 수단인 악성 어플리케이션들은 사용자 정보 유출, 데이터 파괴, 금전 갈취 등을 목적으로 하는데 운영 체제나 프로그래밍 언어가 제공하는 기능을 제어할 수 있게 해주는 인터페이스인 API에 의하여 동작하는 경우가 대부분이다. 본 논문에서는 정적 분석으로 도출한 어플리케이션 내 API의 패턴을 지도 학습 기법으로 머신에 학습하여 정상 어플리케이션과 악성 어플리케이션 내의 API 패턴의 유사도에 따라 악성 어플리케이션을 탐지하는 메커니즘을 제시하고 샘플 데이터에 대하여 해당 메커니즘을 사용하여 도출한 label 별 탐지율과 탐지율 개선을 위한 기법을 보인다. 특히, 제안된 메커니즘의 경우 신종 악성 어플리케이션의 API 패턴이 기존에 학습된 패턴과 일정 수준 유사한 경우 탐지가 가능하며 향후 어플리케이션의 다양한 feature를 연구하여 본 메커니즘에 적용한다면 anti-malware 체계의 신종 악성 어플리케이션 탐지에 사용될 수 있을 것이라 예상된다.

스마트 모바일 환경에서 의료정보 동적접근 시스템 (Medical Information Dynamic Access System in Smart Mobile Environments)

  • 정창원;김우홍;윤권하;주수종
    • 인터넷정보학회논문지
    • /
    • 제16권1호
    • /
    • pp.47-55
    • /
    • 2015
  • 최근, 병원정보시스템의 환경은 다양한 스마트 기술을 접목하고 있는 추세이다. 따라서, 스마트 폰, 테블렛 PC와 같은 다양한 스마트 디바이스가 의료 정보 시스템에 활용된다. 또한, 이러한 환경은 이기종 센서, 디바이스, 시스템 및 네트워크에서 실행되는 다양한 응용 프로그램으로 구성된다. 이들 병원 정보 시스템 환경에서, 기존의 접근 제어 방식에 의한 보안 서비스를 적용하는 것은 문제가 된다. 기존 보안 방식의 대부분은 접근제어 리스트 구조를 사용한다. 이는 클라이언트 이름, 서비스 객체 메소드 이름으로 접근 제어 매트릭스에 의해 정의된 접근만을 허용한다. 가장 큰 문제점으로는 정적인 접근 방법은 변화되는 상황에 신속하게 적응하지 못한다. 따라서, 우리는 보다 유연하고, 매우 상이한 보안 요구와 다양한 환경에 적용 할 수 있는 새로운 보안 메커니즘을 필요로 한다. 또한, 환자중심의 의료 서비스 형태로 변화되고 있어, 이를 해결하기 위한 연구가 요구된다. 본 논문에서는 스마트 모바일 환경에서 의료정보 동적접근 시스템을 제안하고자 한다. 우리는 기존 병원정보 시스템의 환경을 기반으로 동적접근 제어 방법으로 의료정보 시스템에 접근하는 방법에 중점을 두었다. 물리적인 환경은 모바일 x-ray 영상 디바이스와 전용 모바일 스마트 디바이스, PACS, EMR 서버와 인증 서버로 구성하였다. 소프트웨어 환경은 모바일 X-ray영상기기는 Windows7 OS를 기반으로 동기화 및 모니터링 서비스를 위해 .Net Framework를 기반으로 개발하였다. 그리고 전용 스마트 디바이스는 Android OS를 기반으로 JSP와 Java SDK를 통한 동적접근 응용 서비스를 구현하였다. 병원의 의료영상정보 서버와 모바일 X-ray영상기기, 전용 스마트 디바이스간의 의료정보는 의료영상정보 표준인 DICOM을 기준으로 한다. 또한 EMR 정보는 H7을 기반으로 한다. 동적접근 제어 서비스를 제공하기 위해, 우리는 산소포화도, 심박수, 혈압과 체온과 같은 생체 정보의 값에 대한 조건에 의해 환자의 상황을 분류하고, 의료진의 의료정보 접속 인증 방법으로 동적인 접근 방법을 설계했다. 이는 일반 상태와 응급상태로 2부분으로 구분하여 이벤트 추적 다이어그램으로 보였다. 그리고, 인증 정보는 ID/PWD와 위치, 역할, 작업시간 그리고 응급 환자를 위한 응급 코드를 포함하였다. 동적접근 제어 방법의 일반적인 상황은 인증 정보의 값에 의해 의료정보에 접근 할 수 있다. 그러나 응급상황의 경우는 인증 정보 없이 응급 코드에 의해 의료정보에 접근하도록 하였다. 또한, 우리는 의료정보 표준에 따라 환자, 의료진 및 의료 영상 정보로 구성되는 의료정보 통합 데이터베이스 스키마를 구축했다. 끝으로, 우리는 제안 시스템의 수행 결과를 일반과 응급상황과 같은 환자의 상태에 따라 스마트 디바이스 기반으로 동적접근 응용 서비스의 유용성을 보였다. 특히, 제안 된 시스템은 동적 액세스 제어 방법에 의해 응급상황에서 스마트 디바이스기반의 효과적인 의료 정보 서비스를 제공한다. 이 결과, 제안한 시스템이 u-병원 정보 시스템과 서비스에 유용할 것으로 기대한다.

IP 카메라를 위한 HTML5 기반 통합형 Live Streaming 구현 (Implementation of a unified live streaming based on HTML5 for an IP camera)

  • 류홍남;양길진;김종훈;최병욱
    • 조명전기설비학회논문지
    • /
    • 제28권9호
    • /
    • pp.99-104
    • /
    • 2014
  • This paper presents a unified live-streaming method based on Hypertext Mark-up Language 5(HTML5) for an IP camera which is independent of browsers of clients and is implemented with open-source libraries. Currently, conventional security systems based on analog CCTV cameras are being modified to newer surveillance systems utilizing IP cameras. These cameras offer remote surveillance and monitoring regardless of the device being used at any time, from any location. However, this approach needs live-streaming protocols to be implemented in order to verify real-time video streams and surveillance is possible after installation of separate plug-ins or special software. Recently, live streaming is being conducted through HTML5 using two different standard protocols: HLS and DASH, that works with Apple and Android products respectively. This paper proposes a live-streaming approach that is linked on either of the two protocols which makes the system independent with the browser or OS. The client is possible to monitor real-time video streams without the need of any additional plug-ins. Moreover, by implementing open source libraries, development costs and time were economized. We verified usefulness of the proposed approach through mobile devices and extendability to other various applications of the system.