• Title/Summary/Keyword: Mobile apps

Search Result 364, Processing Time 0.027 seconds

Design of a Middleware for Android-based Smart Phone Applications (안드로이드 기반 스마트 폰 응용을 위한 미들웨어 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.111-117
    • /
    • 2012
  • With the rapid growth of smart phone technologies, mobile user's demands for using services provided by existing web or portal cites are highly increased. These services, however, are designed for the environment of desktop PCs or laptops in general, so it requires lots of costs for corrections and has difficulties for system protection to use in current mobile devices. In this paper, we design and implement a middleware for android-based smart phone apps to cooperate with a portal system with minimum corrections and function configuration. Our middleware system is working as an interface between an existing portal system and mobile devices to provide harmonious usage and safe system protection.

A Study of Security Checks for Android Least Privilege - focusing on mobile financial services - (모바일 앱 최소권한 사전검증에 관한 연구 - 금융, 안드로이드 운영체제 중심으로 -)

  • Cho, Byung-chul;Choi, Jin-young
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A security system in Android OS adopts sandbox and an permission model. In particular, the permission model operates the confirmation of installation time and all-or-nothing policy. Accordingly, the Android OS requires a user agreement for permission when installing an application, however there is very low level of user awareness for the permission. In this paper, the current status of permission requirement within mobile apps will be discovered, and the key inspection list with an appropriate method, when a mobile service provider autonomously inspects the violation of least privilege around financial companies, and its usefulness will be explored.

Characteristics of New Luxury in Louis Vuitton's D2C-Based Mobile Application (D2C(Direct-to-Consumer) 기반 루이비통 모바일 앱에 나타난 뉴 럭셔리(New Luxury) 특성)

  • Kim, Mikyung;Yim, Eunhyuk
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.45 no.5
    • /
    • pp.741-757
    • /
    • 2021
  • In addition to direct sales to consumers, the direct-to-consumers (D2C) strategy, which provides specialized experiences and services, communicates closely with a consumer's perspective. This tendency is related to the recent trend wherein the luxury fashion system is being transformed into a new luxury. Therefore, this study analyzes the development of online D2C platforms and investigates the characteristics of new luxury from the functional, symbolic, and experiential dimension perspectives based on mobile apps, which is becoming increasingly important among online D2C platforms. Based on the study results, the premium of new luxury fashion displayed in Louis Vuitton's mobile D2C platform in terms of product utility and functionality is newly defined as a usable luxury experience. Moreover, from the heritage perspective, based on the cultural sympathy of the brand contents, we determine that an attachment can be formed between new luxury fashion consumers and brands. Additionally, the personalization service and experiential content on the D2C platform can directly afford emotional and bonding induced brand immersion in a playful way.

Detecting Android Emulators for Mobile Games (Focusing on Detecting Nox and LD Player) (모바일 게임용 안드로이드 에뮬레이터 탐지 기법 (Nox와 LD Player 탐지 기법 중심으로))

  • Kim, Nam-su;Kim, Seong-ho;Pack, Min-su;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Many game and financial apps have emulator detection functionality to defend against dynamic reverse engineering attacks. However, existing Android emulator detection methods have limitations in detecting the latest mobile game emulators that are similar to actual devices. Therefore, in this paper, we propose a method to effectively detect Android emulators for mobile games based on Houdini module and strings of a library. The proposed method detects the two emulators, Nox and LD Player through specific strings included in libc.so of bionic, and an analysis of the system call execution process and memory mapping associated with the Houdini module.

Evaluation and Functionality Stems Extraction for App Categorization on Apple iTunes Store by Using Mixed Methods : Data Mining for Categorization Improvement

  • Zhang, Chao;Wan, Lili
    • Journal of Information Technology Services
    • /
    • v.17 no.2
    • /
    • pp.111-128
    • /
    • 2018
  • About 3.9 million apps and 24 primary categories can be approved on Apple iTunes Store. Making accurate categorization can potentially receive many benefits for developers, app stores, and users, such as improving discoverability and receiving long-term revenue. However, current categorization problems may cause usage inefficiency and confusion, especially for cross-attribution, etc. This study focused on evaluating the reliability of app categorization on Apple iTunes Store by using several rounds of inter-rater reliability statistics, locating categorization problems based on Machine Learning, and making more accurate suggestions about representative functionality stems for each primary category. A mixed methods research was performed and total 4905 popular apps were observed. The original categorization was proved to be substantial reliable but need further improvement. The representative functionality stems for each category were identified. This paper may provide some fusion research experience and methodological suggestions in categorization research field and improve app store's categorization in discoverability.

Recognition of GUI Widgets Utilizing Translational Embeddings based on Relational Learning (트랜슬레이션 임베딩 기반 관계 학습을 이용한 GUI 위젯 인식)

  • Park, Min-Su;Seok, Ho-Sik
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.693-699
    • /
    • 2018
  • CNN based object recognitions have reported splendid results. However, the recognition of mobile apps raises an interesting challenge that recognition performance of similar widgets is not consistent. In order to improve the performance, we propose a noble method utilizing relations between input widgets. The recognition process flows from the Faster R-CNN based recognition to enhancement using a relation recognizer. The relations are represented as vector translation between objects in a relation space. Experiments on 323 apps show that our method significantly enhances the Faster R-CNN only approach.

Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps (안드로이드 은행앱의 동적 가상키보드에 대한 취약점 및 대응방안)

  • Cho, Taenam;Choi, SookHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.1
    • /
    • pp.9-16
    • /
    • 2019
  • Smartphones are becoming a portable computer. As a result, even the most sensitive financial application services are now available anywhere on the smartphone. Compared to general PCs, smartphones communicate with external devices through various channels such as wireless internet, mobile communication network, Bluetooth, and NFC, and a wide variety of applications are provided. Therefore, if vulnerabilities exist, the possibility of attack damage increases. In this paper, we analyze the vulnerabilities of dynamic virtual keyboards used in login of banking apps of smartphones with various physical constraints and propose countermeasures.

Meta's Metaverse Platform Design in the Pre-launch and Ignition Life Stage

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.121-131
    • /
    • 2022
  • We look at the initial stage of Meta (previous Facebook)'s new metaverse platform and investigate its platform design in pre-launch and ignition life stage. From the Rocket Model (RM)'s theoretical logic, the results reveal that Meta firstly focuses on investing in key content developers by acquiring virtual reality (VR), video, music content firms and offering production support platform of the augmented reality (AR) content, 'Spark AR' last three years (2019~2021) for attracting high-potential developers and users. In terms of three matching criteria, Meta develops an Artificial Intelligence (AI) powered translation software, partners with Microsoft (MS) for cloud computing and AI, and develops an AI platform for realistic avatar, MyoSuite. In 'connect' function, Meta curates the game concept submitted by game developers, welcomes other game and SNS based metaverse apps, and expands Horizon Worlds (HW) on VR devices to PCs and mobile devices. In 'transact' function, Meta offers 'HW Creator Funding' program for metaverse, launches the first commercialized Meta Avatar Store on Meta's conventional SNS and Messaging apps by inviting all fashion creators to design and sell clothing in this store. Mata also launches an initial test of non-fungible token (NFT) display on Instagram and expands it to Facebook in the US. Lastly, regarding optimization, especially in the face of recent data privacy issues that have adversely affected corporate key performance indicators (KPIs), Meta assures not to collect any new data and to make its privacy policy easier to understand and update its terms of service more user friendly.

A Novel Technique for Detection of Repacked Android Application Using Constant Key Point Selection Based Hashing and Limited Binary Pattern Texture Feature Extraction

  • MA Rahim Khan;Manoj Kumar Jain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.141-149
    • /
    • 2023
  • Repacked mobile apps constitute about 78% of all malware of Android, and it greatly affects the technical ecosystem of Android. Although many methods exist for repacked app detection, most of them suffer from performance issues. In this manuscript, a novel method using the Constant Key Point Selection and Limited Binary Pattern (CKPS: LBP) Feature extraction-based Hashing is proposed for the identification of repacked android applications through the visual similarity, which is a notable feature of repacked applications. The results from the experiment prove that the proposed method can effectively detect the apps that are similar visually even that are even under the double fold content manipulations. From the experimental analysis, it proved that the proposed CKPS: LBP method has a better efficiency of detecting 1354 similar applications from a repository of 95124 applications and also the computational time was 0.91 seconds within which a user could get the decision of whether the app repacked. The overall efficiency of the proposed algorithm is 41% greater than the average of other methods, and the time complexity is found to have been reduced by 31%. The collision probability of the Hashes was 41% better than the average value of the other state of the art methods.

Generation YZ's E-Healthcare Use Factors Distribution in COVID-19's Third Year: A UTAUT Modeling

  • Michael CHRISTIAN;Kurnadi GULARSO;Prio UTOMO;Henilia YULITA;Suryo WIBOWO;Sunarno SUNARNO;Rima MELATI
    • Journal of Distribution Science
    • /
    • v.21 no.7
    • /
    • pp.117-129
    • /
    • 2023
  • Purpose: With the number of COVID-19 cases declining and generational differences among how people use mobile apps, including health service apps, the goal of this research is to identify and analyze the factors that affect people's attitudes when using the Halodoc health service app during the third year of the pandemic. Research design, data, and methodology: This study proposes a quantitative analysis method based on PLS-SEM modeling. This study has used a questionnaire survey to collect randomized data from 268 Halodoc users from generations Y and Z in Jakarta. Results: Both the Y and Z generations believe there is a significant usefulness factor in the attitude toward using the application. The start of the pandemic period demonstrates that the urgency of using health service applications is no longer determined by performance expectations, effort, or social panic, but rather by these applications' usability. Conclusions: Even though a health service application is no longer considered an urgent service or a priority need, attitudes, and behaviors in using it emphasize the aspect of long-term benefits. These findings supplement other considerations and understandings in application of the Unified Theory of Acceptance and Use of Technology (UTAUT) model in explaining attitudes and intention behaviors.