• Title/Summary/Keyword: Mobile Events

Search Result 177, Processing Time 0.025 seconds

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6Network

  • Baek, Jin-Suk;Fisher, Paul S.;Kwak, Ming-Yung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.1
    • /
    • pp.5-21
    • /
    • 2008
  • In order to securely transmit multicast data packets in a mobile environment where frequent join/leave events are a characteristic of the environment, there is a need for a new secure and efficient group key management solution. We propose a secure group key generation/distribution solution providing scalability and reliability. Using this solution, when a mobile node, which is in a multicast session, enters a new domain, the agent of the domain joins the multicast session and coordinates its data packets with the mobile node. The agent encrypts and transmits subsequent data packets to the mobile node, using a local one-time pad key. This key is generated with FI sequences, enabling the mobile node to regenerate the same data packet, based on the information sent by the agent. Our performance analysis demonstrates that the proposed solution can significantly reduce the number of key generations and distributions, when it is applied to the hierarchical mobile IPv6 network.

User-Friendly Personal Photo Browsing for Mobile Devices

  • Kim, Sang-Kyun;Lee, Jae-Won;Lee, Ryong;Hwang, Eui-Hyeon;Chung, Min-Gyo
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.432-440
    • /
    • 2008
  • In this paper, a user-friendly mobile photo album system and albuming functions to support it are introduced. Stand-alone implementation in a mobile device is considered. The main idea of user-friendly photo browsing for albuming functions is to enable users to organize and browse their photos along semantically meaningful axes of events, personal identities, and categories. Experimental results demonstrate that the proposed method would be sufficiently useful and efficient for browsing personal photos in mobile environment.

  • PDF

Simulated Dynamic C&C Server Based Activated Evidence Aggregation of Evasive Server-Side Polymorphic Mobile Malware on Android

  • Lee, Han Seong;Lee, Hyung-Woo
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Diverse types of malicious code such as evasive Server-side Polymorphic are developed and distributed in third party open markets. The suspicious new type of polymorphic malware has the ability to actively change and morph its internal data dynamically. As a result, it is very hard to detect this type of suspicious transaction as an evidence of Server-side polymorphic mobile malware because its C&C server was shut downed or an IP address of remote controlling C&C server was changed irregularly. Therefore, we implemented Simulated C&C Server to aggregate activated events perfectly from various Server-side polymorphic mobile malware. Using proposed Simulated C&C Server, we can proof completely and classify veiled server-side polymorphic malicious code more clearly.

Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events (비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지)

  • Kim, Hodong;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1255-1261
    • /
    • 2020
  • Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared cache resources in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud systems recently, many detection strategies have been proposed. Since the conventional cache side-channel attacks are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor mostly cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, attack detection mechanisms based on cache events may hardly detect the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.

A Development of a Tool for Event Direction in Mobile Game (모바일 게임의 이벤트 연출을 위한 Tool 개발)

  • No, Hae-Sun;Rhee, Dae-Woong
    • Journal of Korea Game Society
    • /
    • v.11 no.1
    • /
    • pp.37-46
    • /
    • 2011
  • Due to the advent of high performance feature-phone and smart-phone, the scale of mobile games and the member of developers are increased rapidly. The production process of mobile games is changing to meet these needs. Tools for efficient program development are produced worldwide, but tool's research for the event direction is inadequate. In the event direction, the game designers play more important roles than programmers. In this paper, we develop the mobile game event direction tool for game designers. And we make the events of the released mobile games to test the efficiency and usefulness of tool that we developed. The result shows that the performance is enhanced about 15% in development period.

Implementation of Dynamic Event Analysis Tool for J2ME Programs (J2ME 프로그램의 동적 이벤트 분석기의 구현)

  • Choi Yoon-Jeong;Chang Byeong-Mo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.802-809
    • /
    • 2006
  • J2ME mobile programs have been widely used as mobile devices like mobile phones become popular. Efficient use of resources in mobile programs is very important because mobile programs are executed in mobile environment with insufficient resources. Moreover, most J2ME programs are event-driven, so effective event handling is important for reliability and efficient use of resource. In this research, we develop a dynamic event analysis system, which can show event handling in real-time. In this system, users can trace only interesting events by selecting some options, and can get event profile after execution.

Mobile Internet News Consumption: An Analysis of News Preferences and News Values

  • Pae, Jung Kun;Seol, Jinah
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.49-56
    • /
    • 2018
  • Internet news consumption is rapidly growing in Korea, and majority of that is being done through Naver, Korea's primary search engine. Naver is also the go-to search engine for smartphone use. This study analyzed 824 most popular news accessed via mobile gears; the news items were selected from Naver's 'Daily Top 10 Stories,' dating from March 2016 to December 2016. The results indicate that entertainment news were the most viewed, while political and social issue news were the most liked and commented by mobile users. With regard to news value, 'prominence' and 'impact' were the two most important factors that influenced a user's news selection process in a mobile environment. The degree of a news' 'prominence' was the most important factor that determined the number of views, while 'impact' was critical to determining "the most commented-upon" and "the most liked" news. The results also indicate that mobile news consumers prefer more dramatic storylines and events that incite public anger or grief, threaten the safety of citizens, or evoke emotional sympathy rather than 'hard news' about such subjects as politics and economics.

An Implementation of a Mobile Sudoku Game with a Step-by-Step Character Raising (단계별 캐릭터 육성을 결합한 모바일 스도쿠 게임 개발)

  • Yu, Ri-A;Yu, Su-Wan;Cho, In-Kyeong;Song, Hye-Ju;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.27-35
    • /
    • 2009
  • Recently, an interest in mobile games is increasing according to the extension of the high speed network infra and the development of mobile devices. In the paper, we propose a mobile Stouku game which trains a brain. The proposed game is user-oriented play style that the game users can raise their characters theirselves. It gives users a sense of achievement and can also help improve intelligence by becoming familiar with a numeral. The game raises an awareness and immersion by adding various events and lowering the degree of difficulty more than previews games. In the paper, we demonstrate the proposed Sudoku game in the mobile device and present the result.

  • PDF

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

Disign of Unmanned Vehicle Control System with LoRa Network (LoRa망을 활용한 무인이동체 관제 시스템 설계)

  • Lee, Jae-Ung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.44-46
    • /
    • 2018
  • In this paper, we design a system that can control unmanned mobile objects through communication between unmanned mobile object and control server system using LoRa network which is a dedicated IoT network. It is more efficient when the unmanned mobile object performs the special work by installing the LoRa network applied to the unmanned mobile object control system from the small space house or office hospital to the factory. In this paper, we will discuss the design of a system that can improve the social utilization of unmanned mobile objects by making it possible to communicate the events that occur around other mobile objects from the simplification of the navigation path.

  • PDF