• Title/Summary/Keyword: Mobile Security

Search Result 1,976, Processing Time 0.034 seconds

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Heuristics evaluation and development of the Caries Management by Risk Assessment (CAMBRA)-kids application for caries management of preschoolers (소아 우식관리를 위한 CAMBRA-kids 애플리케이션 개발 및 휴리스틱 평가)

  • Kang, Yu-Min;Lee, Su-Young
    • Journal of Korean society of Dental Hygiene
    • /
    • v.19 no.4
    • /
    • pp.479-492
    • /
    • 2019
  • Objectives: This study aimed to develop the CAMBRA-kids application for the systematic management of dental caries among preschoolers, activate the dental caries management system, and contribute to the dental caries management of preschoolers. Methods: The collected data were analyzed using R studio 1.2.1335 for Windows (RStudio Inc., Boston, MA, USA, 2018). Algorithm evaluation, heuristic evaluation and usability evaluation were analyzed using descriptive statistics. Results: Both expert evaluations of the application's algorithms were calculated as 100%, for proficiency and efficiency. The application worked well with the designed algorithms, the risk group level of participants was categorized appropriately, and the risk management method was guided properly according to the risk group level. Of the five problems presented in the heuristic evaluation, 'the lack of security' and 'the lack of information on oral health care' received 'high severity' scores. The usability evaluation of the application produces an overall score of 3.27. In the subscales (participation, functionality, aesthetics, and information) of the Mobile App Rating Scale (MARS), the 'participation' domain received the lowest score of 2.56 and the 'functional' domain received the highest score of 3.70. Conclusions: The CAMBRA-kids application is expected to be applied and used in the field of preschoolers' oral health care management, and to contribute to the prevention of dental caries of preschoolers by activating the dental caries management system using the application.

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

Analysis of Deregistration Attacks in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Kyungmin;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.81-88
    • /
    • 2021
  • In this paper, we analyze the possibility of deregistration attack in 5G SNPN (Standalone Non-Public Network) based on 3GPP standard document. In the deregistraion attack, the attacker pretends to be a UE that is normally registered with AMF (Access and Mobility Management Function) and attempts to establish a spoofed RRC (Radio Resource Control) connection, causing AMF to deregister the existing UE. The existing deregistration attack attempts a spoofed RRC connection to the AMF in which the UE is registered. In addition, this paper analyzes whether deregistration attack is possible even when an attacker attempts to establish a spoofed RRC connection to a new AMF that is different from the registered AMF. When the 5G mobile communication network system is implemented by faithfully complying with the 3GPP standard, it is determined that a deregistration attack of a UE is impossible.

A Design and Implementation of Product Information Guide System Based on Beacon

  • Lee, Won Joo;Yoo, Jung Hyun;Lee, Kang-Ho;Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.119-126
    • /
    • 2020
  • In this paper, we design and implement a product information guidance system Based on BLE beacons. This system is designed to provide various functions such as contactless entrance service through mobile ticket, seat guidance service, event push service, content push service, and public service. This system consists of three modules: a beacon recognition module, a server linkage module, and a content transmission module. The beacon recognition module implements a function of transmitting a specific ID of a nearby beacon when a customer with a smartphone approaches the available service area. The server linkage module recognizes the beacon ID value, transfers it to the server, and implements the function to check the location of the server having the ID. The content transmission module implements a function of transmitting event or service information set at a corresponding location to a smartphone. The beacon-based product information guidance system implemented in this paper has the advantage of being able to quickly and easily implement various product information guidance systems.

Application of Machine Learning Techniques for Problematic Smartphone Use (스마트폰 과의존 판별을 위한 기계 학습 기법의 응용)

  • Kim, Woo-sung;Han, Jun-hee
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.3
    • /
    • pp.293-309
    • /
    • 2022
  • Purpose - The purpose of this study is to explore the possibility of predicting the degree of smartphone overdependence based on mobile phone usage patterns. Design/methodology/approach - In this study, a survey conducted by Korea Internet and Security Agency(KISA) called "problematic smartphone use survey" was analyzed. The survey consists of 180 questions, and data were collected from 29,712 participants. Based on the data on the smartphone usage pattern obtained through the questionnaire, the smartphone addiction level was predicted using machine learning techniques. k-NN, gradient boosting, XGBoost, CatBoost, AdaBoost and random forest algorithms were employed. Findings - First, while various factors together influence the smartphone overdependence level, the results show that all machine learning techniques perform well to predict the smartphone overdependence level. Especially, we focus on the features which can be obtained from the smartphone log data (without psychological factors). It means that our results can be a basis for diagnostic programs to detect problematic smartphone use. Second, the results show that information on users' age, marriage and smartphone usage patterns can be used as predictors to determine whether users are addicted to smartphones. Other demographic characteristics such as sex or region did not appear to significantly affect smartphone overdependence levels. Research implications or Originality - While there are some studies that predict smartphone overdependence level using machine learning techniques, but the studies only present algorithm performance based on survey data. In this study, based on the information gain measure, questions that have more influence on the smartphone overdependence level are presented, and the performance of algorithms according to the questions is compared. Through the results of this study, it is shown that smartphone overdependence level can be predicted with less information if questions about smartphone use are given appropriately.

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

5G based Smart Railway Communication Technology Trends (5G 기반 스마트 철도 통신 기술 동향)

  • Kim, Young-dong;Kim, Jongki;Lee, Sanghak;Park, Eunkyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.478-480
    • /
    • 2022
  • Smart Railway as a next generation railway technology is expected to have rapid evolution with developments of information and communications tehchology. Especially, smart railway will be progressed more evolved transportation means for railway operation and costomer service based with spread of commercial 5G communication. So, it is very important to investigate and analyze trends of smart railway related tehcnology of 5G mobile communication for samrt railway infra structure, server technolgy for AI, big data, deep learning, information security technology, sensor and IoT. In this paper, 5G based communicaion technology and application techology related smart railway is described and trends of new techlogy on this communication tehnology is investigated. The results of this study can be used for smart railway study and implementation, research and development for smart railway communicaion technology, etc.

  • PDF

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.