• Title/Summary/Keyword: Google Protect

Search Result 23, Processing Time 0.034 seconds

Implementation of AI-based Disaster Safety Communication Network protect (AI 기반 재난안전통신망 프로텍트 구현)

  • Bae, Se-jin;Ahn, Jung-hyun;Rhee, Jung-soo;Park, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.655-656
    • /
    • 2021
  • April 2021, Disaster Safety Communication Network services have been launched, but security functions are weak at the beginning of the service. The current security method for Android-based APP is using Google Protect's technology to detect malware. Malware is difficult to detect directly because there are various types, so by applying malware detection technology that combines AI and Google Protect technology to Disaster Safety Communication Networks, research on how to implement 'AI-based Disaster Satety Communication Network Protect'.

  • PDF

The Detection of Android Malicious Apps Using Categories and Permissions (카테고리와 권한을 이용한 안드로이드 악성 앱 탐지)

  • Park, Jong-Chan;Baik, Namkyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.907-913
    • /
    • 2022
  • Approximately 70% of smartphone users around the world use Android operating system-based smartphones, and malicious apps targeting these Android platforms are constantly increasing. Google has provided "Google Play Protect" to respond to the increasing number of Android targeted malware, preventing malicious apps from being installed on smartphones, but many malicious apps are still normal. It threatens the smartphones of ordinary users registered in the Google Play store by disguising themselves as apps. However, most people rely on antivirus programs to detect malicious apps because the average user needs a great deal of expertise to check for malicious apps. Therefore, in this paper, we propose a method to classify unnecessary malicious permissions of apps by using only the categories and permissions that can be easily confirmed by the app, and to easily detect malicious apps through the classified permissions. The proposed method is compared and analyzed from the viewpoint of undiscovered rate and false positives with the "commercial malicious application detection program", and the performance level is presented.

Design of Security Keypad Against Key Stroke Inference Attack (입력 위치 유추 방지를 위한 보안 키패드의 설계)

  • Seo, Hwajeong;Kim, Howon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.41-47
    • /
    • 2016
  • In Black hat USA 2014, a hacking method to infer the password entry of smartphone or smartpad with google glass in distance is presented. In this paper, we design the secure keypad to protect the key stroke inference attacks with google glass which has unique layout ensuring same input entry but different input value.

Real-time, location-based notification service app for first aid to protect golden time in case of emergency patients (응급환자 발생 시 골든타임을 지키기 위한 응급처치 실시간 위치 기반 알림 서비스 애플리케이션)

  • Oh, Seung-Eun;Jang, Youn-He
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.5-7
    • /
    • 2020
  • 본 논문에서는 응급상황 발생 시, 응급 처치가 가능한 주변 사용자에게 알람을 보내 구급대원이 오기 전까지 응급 구조를 원활하게 도와주는 안드로이드 애플리케이션 시스템 구현 결과를 보인다. Google Map API를 이용하여 사용자의 위치를 실시간으로 지도에 표시한다. 그리고 FireBase Cloud Messaging API를 이용하여 애플리케이션 이용자들에게 알람을 보낸다. 또한, WebRTC API를 이용하여 애플리케이션 안에서 음성 및 영상 통화를 할 수 있다. 애플리케이션을 켜지 않아도 위젯을 활용하여 응급상황을 신고할 수 있도록 하여 애플리케이션의 활용성을 높였다.

AI Security Plan for Public Safety Network App Store (재난안전통신망 앱스토어를 위한 AI 보안 방안 마련)

  • Jung, Jae-eun;Ahn, Jung-hyun;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.458-460
    • /
    • 2021
  • The provision and application of public safety network in Korea is still insufficient for security response to the mobile app of public safety network in the stages of development, initial construction, demonstration, and initial service. The available terminals on the Disaster Safety Network (PS-LTE) are open, Android-based, dedicated terminals that potentially have vulnerabilities that can be used for a variety of mobile malware, requiring preemptive responses similar to FirstNet Certified in U.S and Google's Google Play Protect. In this paper, before listing the application service app on the public safety network mobile app store, we construct a data set for malicious and normal apps, extract features, select the most effective AI model, perform static and dynamic analysis, and analyze Based on the result, if it is not a malicious app, it is suggested to list it in the App Store. As it becomes essential to provide a service that blocks malicious behavior app listing in advance, it is essential to provide authorized authentication to minimize the security blind spot of the public safety network, and to provide certified apps for disaster safety and application service support. The safety of the public safety network can be secured.

  • PDF

Implementation Privacy Reference Architecture for Forensic Readiness

  • Shin, Yong-Nyuo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.1
    • /
    • pp.53-59
    • /
    • 2012
  • As the Privacy Act is in force in Korea, the subject of protection responsibility is increased, and continuous efforts are made to protect privacy in overseas countries, as can be seen by standard drafts related to privacy protection. However, the reality is that a formal privacy manual or guidelines are insufficient to help cope with the rapid changes and privacy leak caused by TGIF(Twitter-Google-iPhone-Facebook) these days, and practical effects cannot be expected, even though measures are taken. This paper propose a standard format for satisfying the ISO/IEC 29101 "Privacy Reference Architecture" and shows an implementation example for equipping with forensic readiness capturing indications of the incident rapidly and coming up with an effective counter measure when privacy information is disclosed.

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.

Development of Simulation Tool to Support Privacy-Preserving Data Collection (프라이버시 보존 데이터 수집을 지원하기 위한 시뮬레이션 툴 개발)

  • Kim, Dae-Ho;Kim, Jong Wook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1671-1676
    • /
    • 2017
  • In theses days, data has been explosively generated in diverse industrial areas. Accordingly, many industries want to collect and analyze these data to improve their products or services. However, collecting user data can lead to significant personal information leakage. Local differential privacy (LDP) proposed by Google is the state-of-the-art approach that is used to protect individual privacy in the process of data collection. LDP guarantees that the privacy of the user is protected by perturbing the original data at the user's side, but a data collector is still able to obtain population statistics from collected user data. However, the prevention of leakage of personal information through such data perturbation mechanism may cause the significant reduction in the data utilization. Therefore, the degree of data perturbation in LDP should be set properly depending on the data collection and analysis purposes. Thus, in this paper, we develop the simulation tool which aims to help the data collector to properly chose the degree of data perturbation in LDP by providing her/him visualized simulated results with various parameter configurations.

An exploratory study on the impacts of International Digital Tax Agreement on Korean Industry (디지털세 국제 합의가 국내 산업에 미치는 영향에 대한 탐색적 연구)

  • Lee, Jinhui;Kim, Taeyeol
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.10-31
    • /
    • 2021
  • The digital tax, recently referred to as the Google tax was finally agreed at the 31st General Assembly of the OECD (October 8, 2021) with full support by 136 countries and will take effect from 2023. The purpose of this study is to analyze the digital tax prepared by the OECD for global MNEs, and to suggest the impacts on the Korean industry and to present the Korean governmental countermeasures. As the first study, we analyzed the international agreement on digital tax. In results, we found that even if global MNEs do not set up a business operation in overseas countries, if sales and profits are generated, 25% of the excess profit is borne as tax (pillar 1), and when MNEs do business in all the countries, they are liable to at least a 15% tax (pillar 2). We think that countries around the world have prepared a minimum countermeasure to protect their companies in anticipation that global MNEs will easily encroach on their markets in the future. As the second study, in order to discover the reason why the MNEs are so strong, we investigated the trends of Google and B2B SaaS companies in details. In results, we discovered that the global MNEs establishes a digital platform partnership ecosystem that enables them to enter foreign markets easily and expand rapidly. In conclusion, as a countermeasure for the Republic of Korea, governmental policies were proposed at the corporate (startup nurturing), industry, and national level respectively.

Exploring Predictors of Preventive Behavior against COVID-19:Centered on Korean Collegians' Social Distancing (코로나19 예방행동 영향요인의 탐색: 우리나라 대학생의 사회적 거리두기를 중심으로)

  • Joo, Jihyuk
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.488-496
    • /
    • 2022
  • For over two years, after COVID-19 was first reported in the last quarter of 2019, the world has suffered from the pandemic. The Korean government has taken an initiative and has implemented a variety of policies to protect people from COVID-19. These policies have resulted in some suffering and inconvenience for people. In this context, we aim to find out what factors influence Korean college students' intention to social distance. We surveyed with Google's online survey tool(Google Form) for 116 Korean college students using a convenient sampling from December 30, 2020, to January 8, 2021. We put perceived susceptibility, perceived severity, perceived health status, level of involvement, and trust in the policy as independent variables into a multiple regression equation using the stepwise method. We found that intention to social distance was predicted by perceived susceptibility, level of involvement, and trust in the policy in the final model. The findings mean that the more people perceive themselves susceptible to COVID-19, and the more they get involved with COVID-19, and the more they trust their governmental policies on COVID-19, the more they agree on social distancing.