• Title/Summary/Keyword: Android security

Search Result 289, Processing Time 0.025 seconds

A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android (안드로이드폰 SSID 변조를 통한 새로운 과금 유발 취약점에 관한 연구)

  • Heo, Geon-Il;Yoo, Hong-Ryul;Park, Chan-Uk;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • Wireless network is one of the 2010's most important security issues. As smartphone is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP haven't being managed properly in terms of security, Wireless Internet users also don't recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all Probe Request are generated around, and brings induction of service charge and communication problems in its train.

Detection of Android Apps Requiring Excessive Permissions (과도한 권한을 요구하는 안드로이드 앱 탐지)

  • Bae, Gyeongryoon;Lee, Yonjae;Kim, Euiyeon;Tae, Gyubin;Kim, Hyung-Jong;Lee, Hae Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.79-80
    • /
    • 2018
  • 안드로이드 운영체제는 앱을 설치하거나 실행할 때 사용자가 해당 앱이 요청하는 권한들을 승인하도록 하고 있으나, 일반적인 사용자들은 이를 주의 깊게 확인하지 않고 승인하는 경우가 많으며, 과도한 권한들을 요구하는 앱의 실행은 프라이버시 침해 문제로 이어질 수 있다. 본 논문에서는 제공하는 기능들에 비해 과도한 권한들을 요구하는 안드로이드 앱들을 탐지하는 모델을 제안한다. 먼저 손전등, 다이어리, 지불(페이) 및 채팅 앱 207개를 대상으로 요구하는 권한들을 조사하여 정리하였다. 조사 결과를 기준으로 설치 또는 실행하려는 앱이 어느 정도의 권한들을 요구하는지 가늠할 수 있다. 설치된 앱들의 요구 권한들을 조회할 수 있는 앱 프로토타입을 개발하였으며, 향후 모델의 구체화 및 검증을 거쳐, 프로토타입에 적용할 계획이다.

  • PDF

A Study on the Security Mechanisms of Mobile Operating Systems and the Detection of New Attack Paths (모바일 운영체제의 보안 매커니즘과 새로운 공격 경로 탐지)

  • A.S Kim;Jae-kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.625-627
    • /
    • 2023
  • 본 논문은 모바일 운영체제의 보안 매커니즘을 조사하고, 현재까지 알려진 공격 경로뿐만 아니라 새로운 공격 경로를 탐지하기 위한 방법에 대해 연구하였다. 모바일 운영체제 보안은 사용자의 개인 정보와 중요한 데이터를 보호하는 데 매우 중요하며, 이에 대한 이해와 공격 경로의 탐지는 보안 강화에 필수적이다. 본 연구에서는 iOS와 Android를 중심으로 모바일 운영체제의 주요 보안 매커니즘을 분석하고, 샌드박스 환경, 권한 관리, 암호화 등의 보안 매커니즘에 대해 상세히 살펴보았다. 또한, 이전 연구들에서 파악된 공격 경로 외에도 새로운 공격 경로를 발견하고 탐지하기 위한 방법과 도구를 개발하였다.

  • PDF

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices (안드로이드 단말에서의 상황별 위험도 분석 및 상황별 위험도 기반 지속인증 기법)

  • Kim, Jihwan;Kim, SeungHyun;Kim, Soo-Hyung;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1154-1164
    • /
    • 2016
  • To prevent the use of one's smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone's security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.

Detecting Repackaged Applications using the Information of App Installation in Android Smartphones (안드로이드 스마트폰에서 앱 설치 정보를 이용한 리패키징 앱 탐지 기법)

  • Joun, Young Nam;Ahn, Woo Hyun
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • In recently years, repackaged malwares are becoming increased rapidly in Android smartphones. The repackaging is a technique to disassemble an app in a market, modify its source code, and then re-assemble the code, so that it is commonly used to make malwares by inserting malicious code in an app. However, it is impossible to collect all the apps in many android markets including too many apps. To solve the problem, we propose RePAD (RePackaged App Detector) scheme that is composed of a client and a remote server. In the smartphone-side, the client extracts the information of an app with low CPU overhead when a user installs the app. The remote server analyzes the information to decide whether the app is repackaged or not. Thus, the scheme reduces the time and cost to decide whether apps are repackaged. For the experiments, the client and server are implemented as an app on Galaxy TAB and PC respectively. We indicated that seven pairs of apps among ones collected in official and unofficial market are repackaged. Furthermore, RePAD only increases the average of CPU overhead of 1.9% and the maximum memory usage of 3.5 MB in Galaxy TAB.

A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application" (안전한 안드로이드 어플리케이션 개발을 위한 구현 단계별 보안성 검증 방안 제시)

  • Hur, Hwan Seok;Kang, Sung Hoon;Kim, Seung Joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.10
    • /
    • pp.445-460
    • /
    • 2013
  • Mobile applications today are being offered as various services depending on the mobile device and mobile environment of users. This increase in mobile applications has shifted the spotlight to their vulnerability. As an effective method of security verification, this paper proposes "phase-wise security verification for the implementation of mobile applications". This method allows additional security verification by covering specific items across a wider range compared to existing methods. Based on the identified weaknesses, it detects the cause of vulnerability and monitors the related settings.

Advanced Feature Selection Method on Android Malware Detection by Machine Learning (악성 안드로이드 앱 탐지를 위한 개선된 특성 선택 모델)

  • Boo, Joo-hun;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.357-367
    • /
    • 2020
  • According to Symantec's 2018 internet security threat report, The number of new mobile malware variants increased by 54 percent in 2017, as compared to 2016. And last year, there were an average of 24,000 malicious mobile applications blocked each day. Existing signature-based technologies of malware detection have limitations. So, malware detection technique through machine learning is being researched to detect malware variant. However, even in the case of applying machine learning, if the proper features of the malware are not properly selected, the machine learning cannot be shown correctly. We are focusing on feature selection method to find the features of malware variant in this research.

The Study on the security of Smartphone (스마트폰 보안 기술 분석)

  • Lee, Young Sook;Kim, Jee Yeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.