• Title/Summary/Keyword: Third-Party Applications

Search Result 46, Processing Time 0.024 seconds

Analysis of a Third-Party Application for Mobile Forensic Investigation

  • Ryu, Jung Hyun;Kim, Nam Yong;Kwon, Byoung Wook;Suk, Sang Ki;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.680-693
    • /
    • 2018
  • Nowadays, third-party applications form an important part of the mobile environment, and social networking applications in particular can leave a variety of user footprints compared to other applications. Digital forensics of mobile third-party applications can provide important evidence to forensics investigators. However, most mobile operating systems are now updated on a frequent basis, and developers are constantly releasing new versions of them. For these reasons, forensic investigators experience difficulties in finding the locations and meanings of data during digital investigations. Therefore, this paper presents scenario-based methods of forensic analysis for a specific third-party social networking service application on a specific mobile device. When applied to certain third-party applications, digital forensics can provide forensic investigators with useful data for the investigation process. The main purpose of the forensic analysis proposed in the present paper is to determine whether the general use of third-party applications leaves data in the mobile internal storage of mobile devices and whether such data are meaningful for forensic purposes.

Implementation of NGN Service and Performance Measurement (NGN 서비스 구현과 성능측정)

  • Kim Hyoung-min;Kim Hwa-sung;Choi Young-il;Lee Byung-sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.1-6
    • /
    • 2005
  • Communication network is in a transition toward the NGN (Next Generation Networks) to accommodate the explosive demand of new services. The NGN allows the third-party application provisioning by defining the networks as layers of Services, Distributed Processing Environment and Transport. Especially, the Service layer can further be divided into Application and Service Component layer. In order to realize the third-party application provisioning, the Parlay Group has adopted an open Parlay API as an interface between the Application and the Service Component layer. Using Parlay API, the third parties may develop and deploy the IT-based applications at the Application layer exploiting the service components located within network operators' domain. In this paper, we present the implementation details about the Third Party Call Control (TPCC) Service using the third-party service logic based on Parlay API and Parlay X API, when SIP is used as a signaling protocol in Transport layer. Also, we compare the performance evaluation of both implementations.

ESA Earth Observation Programmes and International Cooperation in the frame of Third Party Missions

  • Hoersch B.;Laur H.;Kohlhammer G.
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.598-600
    • /
    • 2004
  • In Europe most Earth Observation (EO) data users rely on several EO missions, both to increase sustainability of their service and to widen the range of observation parameters. In addition to its own missions such as ERS 1 &2, ENVISAT and the Earth Explorers, ESA therefore offers access to the scientific and applications community to so-called 'Third Party Missions'. Third Party (TP) missions are complementing the observations of ESA missions, are used to prepare for future ESA missions including cross-calibration and create synergy to favor a wider use of EO data within ESA Member States.

  • PDF

Androfilter: Android Malware Filter using Valid Market Data (Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터)

  • Yang, Wonwoo;Kim, Jihye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1341-1351
    • /
    • 2015
  • As the popularization of smartphone increases the number of various applications, the number of malicious applications also grows rapidly through the third party App Market or black market. This paper suggests an investigation filter, Androfilter, that detects the fabrication of APK file effectively. Whereas the most of antivirus software uses a separate server to collect, analyze, and update malicious applications, Androfilter assumes Google Play as the trusted party and verifies integrity of an application through a simple query to Google Play. Experiment results show that Androfilter blocks brand new malicious applications that have not been reported yet as well as known malicious applications.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

Evaluation of 3PL Service Quality Using the AHP -An Application to Korean 3PL Service Providers-

  • So, Soon-Hoo;Cheong, Ki-Ju;Kim, Jae-Jon;Cho, Geon;Ryu, Il
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.293-296
    • /
    • 2005
  • This study applies the Analytic Hierarchy Process (AHP) to evaluate service quality of Third-Party Logistics (3PL) service providers. For this, we first conceptualize five dimensions of 3PL service quality (i.e. tangibles, reliability, responsiveness, assurance and empathy). We then apply the AHP method to determining the relative weights of five service quality dimensions and eventually selecting the best 3PL service provider. To implement this idea in practice, we conduct an empirical study on four companies providing 3PL services in Korea.

  • PDF

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.

Determinants of Online Price Sensitivity Using Web Log Data (웹 로그 데이터를 이용한 온라인 소비자의 가격민감도 영향 요인에 관한 연구)

  • Jun Jong-Kun;Park Cheol
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • This paper empirically analyzed consumer price search behavior using Web log data of a Korean web site for price comparison. Consumer click-stream data of the site was used to test the effects of price level, product category, third party certification, reputation of retailers on click behavior. According to the descriptive statistics, 67.4% of shopbot users clicked the offer which was the lowest price returned in a search. We found that third party certification and reputation of retailers were significant determinants of clicking the lowest priced offer from legit analysis. We also applied Tobit regression analysis to estimate the price premium of the two determinants, but only reputation of retailers was found to have price premium of 4.9%.

  • PDF

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Modeling Service based on XML Schema for MPEG Multimedia Middleware

  • Hendry Hendry;Kim Mun-Churl
    • Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.114-128
    • /
    • 2006
  • Recently MPEG (Moving Picture Experts Group) has started a new standardization activity called MPEG Multimedia Middleware (M3W). The M3W supports multimedia applications Independent of hardware and software such as operating systems so that the portability and interoperability of multimedia applications are greatly improved. In doing so, the M3W adopts the concept of a service-based middleware. The M3W standardizes a set of multimedia Application Programming Interfaces (APIs) and their implementations can be pro vided by third parties In the form of services. In this paper, we introduce the usage of XML metadata in describing the standard multimedia APIs and third party's services and also we explain the role of the XML Schema within the M3W in providing transparent access from application to the M3W services.

  • PDF