• Title/Summary/Keyword: Mobile Messengers

Search Result 21, Processing Time 0.025 seconds

A study on the Comparison Analysis for Messenger Evidence Using Mobile Forensics (모바일 포렌식을 이용한 메신저 증거 비교 분석 연구)

  • Hwang, Taejin;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.25-32
    • /
    • 2018
  • As the use of smartphones become more common, the communication via instant messenger becomes natural. However, it is important to secure the relevant information promptly since the chat room between participants can be used as a space for a criminal conspiracy, and crime-related contents can be stored and deleted easily on smartphones. Therefore, this study aims to identify the available data and to use it as proof by comparing and analyzing the instant messengers with high usage rate.

  • PDF

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data (WeChat 메신저의 향상된 복호화 방안과 SQLite Full Text Search 데이터를 이용한 삭제된 메시지 복구에 관한 연구)

  • Hur, Uk;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.405-415
    • /
    • 2020
  • With the increase in smartphone user, mobile forensics has become an essential element in modern digital forensic investigation. Mobile messenger data is very important data in mobile forensics because it can acquire information such as user's life pattern and mental state. In order to analyze messenger data, a decryption technique of an encrypted messenger data is required. Since most messengers provide a message deleting function, a technique for recovering deleted messages is required. WeChat Messenger, a messenger used by about 1 billion people around the world, uses IMEI (International Mobile Equipment Identity) information to encrypt data and provides message deletion function. In this paper, we propose a data decryption method in the absence of IMEI information and propose a method for recovering deleted messages using FTS (Full Text Search) database created for full-text search function of SQLite database.

The Mobile Meeting Authentication Scheme Providing Mobility and Privacy (이동성과 프라이버시를 제공하는 모바일 회의 인증 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.243-248
    • /
    • 2014
  • The demand for messenger service goes on growing rapidly with widespread use of smartphones. Generally, the smartphone messenger provides group communication functions in which users can make the group and communicate with each other. In the mobile meeting, the attendees can participate in the meeting with use of smartphone messengers wherever they are. To make the mobile meeting put to practical use, the mobility and privacy should be ensured to attendees. To satisfy the mobility requirement, the user which is not belong to the group members should not be able to participate in the meeting. To ensure the privacy requirement, the attendees should have not to repudiate the meeting results. In this study, the mobile meeting authentication scheme is proposed which provides mobility and privacy. The proposed scheme consists of meeting group creation, group key generation, group signature and verification protocols. All attendees should have to participate in the signature verification because it is based on the challenge-response type protocol. Thus, it's not possible to collude with malicious attendees to change the meeting results.

Analysis of Personal Messenger Contents Design as Digital Contents (디지털 콘텐츠로서 개인형 메신저 콘텐츠 디자인 분석에 관한 연구)

  • Oh, Moon Seok;Won, Jong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.183-192
    • /
    • 2010
  • Digital communities' spaces have been very popular through communication contents provide entertainment and usability. Emoticons provide simply emotional expressions and intension, so they weakly convey a realistic sense as they are designed by 2D graphics. However, 3D Avatars presented by 3D Computer Graphics make users interesting because of delivering senses of reality and three-dimension and amuse users because of representing their characters. It is the purpose of this study to analyze design examples of emoticons and avatars applying to personal messengers and propose the development of them. In addition, this paper researches various characteristics of emoticons and avatars for web and mobile phones, and suggests a strategy to usefully and properly apply emoticons and avatars to design.

Evaluation for Critical Success Factors of Mobile Messenger using AHP (AHP를 이용한 모바일 메신저의 주요 성공요소 평가)

  • Kim, Jongwan;Cho, Yang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.1-10
    • /
    • 2017
  • Advanced ICT Technologies support the chance for success in business however there are challenges that should be overcome in messenger development and the overcoming challenges will be a base line for succession in business. In this paper, we identify the characteristics of mobile messengers and evaluate users' preferences using AHP. As a result, we evaluated the critical success factors which are important in mobile messenger development. The results of AHP were generated 0.098 consistency ratio(CR). When the result is less than 0.1 in CR, the result could be accepted as trusted questions. The priority of factors was security(1.409), entertainment(0.19), communication (0.187) then this shows the users concerned in security and entertainment. These are not only development's success factors but also a good milestone to check ICT trends for setting up business chances.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

A Context-aware Messenger for Sharing User Contextual Information (사용자 컨텍스트 공유를 위한 상황인지 메신저)

  • Hong, Jin-Hyuk;Yang, Sung-Ihk;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.906-910
    • /
    • 2008
  • As the mobile environment becomes widely used, there is a growth on the concern about recognizing and sharing user context. Sharing context makes the interaction between human more plentiful as well as helps to keep a good social relationship. Recently, it has been applied to some messengers or mobile applications with sharing simple contexts, but it is still required to recognize and share more complex and diverse contexts. In this paper, we propose a context-aware messenger that collects various sensory information, recognizes representative user contexts such as emotion, stress, and activity by using dynamic Bayesian networks, and visualizes them. It includes a modular model that is effective to recognize various contexts and displays them in the form of icons. We have verified the proposed method with the scenario evaluation and usability test.

Factors Related to Smartphone Dependence among Adults in Their 20s (20대 성인의 스마트폰 의존 관련 요인)

  • Park, Jeong-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.195-204
    • /
    • 2020
  • The purpose of this study was to explore factors associated with smartphone dependence among adults in their 20s. The data were derived from the 2017 Survey on Smartphone Over-dependence conducted by the Ministry of Science and ICT and the National Information Society Agency. There were 3,684 participants. The data were analyzed by frequency, percentage, mean, standard deviation, independent t-test, Pearson's correlation coefficient, and weighted hierarchical multiple regression analysis. For the results, factors related with higher smartphone dependence of participants were duration (β=.18, p=.000) and frequency (β=.04, p=.000) of usage, gaming (β=.15, p=.000), watching videos (β=.09, p=.000), mobile shopping (β=.05, p=.000), working (β=.05, p=.010), e-mailing (β=.13, p=.000), and sports betting (β=.07, p=.000). Music (β=-.07, p=.000) and adult content (β=-.07, p=.000) significantly reduced their smartphone dependence. SNS (Social Networking Services) (β=.01, p=.358) and instant messengers (β=-.02, p=.330) were not factors related to smartphone dependence. However, instant messengers were the most used by participants and had a strong correlation with working (r=.55, p=.000). This study shows that smartphone usage patterns related with smartphone dependence among adults in their 20s are different from those of children and adolescents. These results could be used to more deeply understand smartphone dependence among adults in their 20s and plan early detection and prevention and care of dependence.

Android Malware Detection Using Auto-Regressive Moving-Average Model (자기회귀 이동평균 모델을 이용한 안드로이드 악성코드 탐지 기법)

  • Kim, Hwan-Hee;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1551-1559
    • /
    • 2015
  • Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.