• 제목/요약/키워드: Third-Party Applications

검색결과 46건 처리시간 0.028초

Analysis of a Third-Party Application for Mobile Forensic Investigation

  • Ryu, Jung Hyun;Kim, Nam Yong;Kwon, Byoung Wook;Suk, Sang Ki;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제14권3호
    • /
    • pp.680-693
    • /
    • 2018
  • Nowadays, third-party applications form an important part of the mobile environment, and social networking applications in particular can leave a variety of user footprints compared to other applications. Digital forensics of mobile third-party applications can provide important evidence to forensics investigators. However, most mobile operating systems are now updated on a frequent basis, and developers are constantly releasing new versions of them. For these reasons, forensic investigators experience difficulties in finding the locations and meanings of data during digital investigations. Therefore, this paper presents scenario-based methods of forensic analysis for a specific third-party social networking service application on a specific mobile device. When applied to certain third-party applications, digital forensics can provide forensic investigators with useful data for the investigation process. The main purpose of the forensic analysis proposed in the present paper is to determine whether the general use of third-party applications leaves data in the mobile internal storage of mobile devices and whether such data are meaningful for forensic purposes.

NGN 서비스 구현과 성능측정 (Implementation of NGN Service and Performance Measurement)

  • 김형민;김화성;최영일;이병선
    • 한국통신학회논문지
    • /
    • 제30권1B호
    • /
    • pp.1-6
    • /
    • 2005
  • 오늘날 통신네트워크는 음성과 데이터의 통합으로 가는 것과 동시에 새로운 서비스가 요구가 증가됨에 따라서 NGN으로 변화하고 있다. NGN은 Service, Transport, Distributed Processing Environment의 3개 계층으로 구성된다. 여기서 Service 계층은 다시 애플리케이션 계층과 Service Component 계층으로 구분할 수 있다. Parlay Group은 third-party 애플리케이션 제공의 실현을 위하여, 애플리케이션과 Service Component Layer사이에 인터페이스로 개방형 Parlay API를 채택하고 있다. Parlay API를 사용함으로써 third-party 업체들은 네트워크 제공자가 제공하는 Service component위에 있는 애플리케이션 레이어 즉 새로운 애플리케이션을 개발을 하게 될 것이다. 본 논문에서는 third-party 서비스를 이용한 Third Party Call Control (TPCC) 서비스를 구현 하였다. TPCC서비스는 Parlay APl와 Parlay X APl를 사용해 각각 구현하였으며 Transport layer에서 시그널링 프로토콜로는 SIP를 사용하였다. 또한 각 구현사항들에 대하여 성능 측정을 실시하여 비교하였다.

ESA Earth Observation Programmes and International Cooperation in the frame of Third Party Missions

  • Hoersch B.;Laur H.;Kohlhammer G.
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.598-600
    • /
    • 2004
  • In Europe most Earth Observation (EO) data users rely on several EO missions, both to increase sustainability of their service and to widen the range of observation parameters. In addition to its own missions such as ERS 1 &2, ENVISAT and the Earth Explorers, ESA therefore offers access to the scientific and applications community to so-called 'Third Party Missions'. Third Party (TP) missions are complementing the observations of ESA missions, are used to prepare for future ESA missions including cross-calibration and create synergy to favor a wider use of EO data within ESA Member States.

  • PDF

Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터 (Androfilter: Android Malware Filter using Valid Market Data)

  • 양원우;김지혜
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1341-1351
    • /
    • 2015
  • 스마트폰의 대중화로 다양한 애플리케이션이 증가하면서, Third party App Market 이나 블랙마켓을 통한 악성 애플리케이션 또한 급격한 증가세에 있다. 본 논문에서는 APK파일의 변조여부를 효과적으로 검출할 수 있는 검사 필터인 Androfilter를 제안한다. Androfilter는 대부분의 안티바이러스 소프트웨어들이 사용하는 수집, 분석, 업데이트 서버등을 사용하지 않고, Google Play를 신뢰 기관으로 가정하여 대응되는 애플리케이션의 조회만으로 애플리케이션의 변조여부를 판단 한다. 실험 결과에 따르면 변조된 애플리케이션을 감지함으로 보고되지 않은 신종 악성코드를 차단할 수 있다.

구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구 (Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice)

  • 이세영;박재균;홍성대;최형기
    • 정보과학회 논문지
    • /
    • 제42권1호
    • /
    • pp.23-32
    • /
    • 2015
  • 안드로이드 마켓을 보면 서드 파티 어플리케이션이 상당한 비중을 차지하는 것을 볼 수 있다. 하지만 이런 서드 파티 어플리케이션의 보안 측면에 대한 연구는 많이 이루어지지 않고 있는 실정이다. 그 중에서도 서드 파티 어플리케이션이 많이 사용되는 것 중 하나가 모바일 VoIP(Voice Over IP) 어플리케이션이다. 모바일 VoIP 어플리케이션 중에서 본 논문은 구글 보이스 서비스를 연동시켜주는 대표적인 3가지 서드 파티 어플리케이션의 사용자 인증 구조에 대해 알아본다. 그리고 안드로이드 파일 시스템 구조 속에서 사용자 계정 정보를 저장하고 있는 파일을 통해 계정 정보를 전달하는 흐름을 파악하고 현재 쓰이고 있는 방법에 대한 취약점을 통해 일어날 수 있는 위험 요소를 알아보고 타원 곡선 디피-헬만 키 교환과 해시 체이닝을 사용해 개선된 인증 메커니즘 방안을 제안한다.

Evaluation of 3PL Service Quality Using the AHP -An Application to Korean 3PL Service Providers-

  • So, Soon-Hoo;Cheong, Ki-Ju;Kim, Jae-Jon;Cho, Geon;Ryu, Il
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.293-296
    • /
    • 2005
  • This study applies the Analytic Hierarchy Process (AHP) to evaluate service quality of Third-Party Logistics (3PL) service providers. For this, we first conceptualize five dimensions of 3PL service quality (i.e. tangibles, reliability, responsiveness, assurance and empathy). We then apply the AHP method to determining the relative weights of five service quality dimensions and eventually selecting the best 3PL service provider. To implement this idea in practice, we conduct an empirical study on four companies providing 3PL services in Korea.

  • PDF

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.

웹 로그 데이터를 이용한 온라인 소비자의 가격민감도 영향 요인에 관한 연구 (Determinants of Online Price Sensitivity Using Web Log Data)

  • 전종근;박철
    • Journal of Information Technology Applications and Management
    • /
    • 제13권1호
    • /
    • pp.1-16
    • /
    • 2006
  • This paper empirically analyzed consumer price search behavior using Web log data of a Korean web site for price comparison. Consumer click-stream data of the site was used to test the effects of price level, product category, third party certification, reputation of retailers on click behavior. According to the descriptive statistics, 67.4% of shopbot users clicked the offer which was the lowest price returned in a search. We found that third party certification and reputation of retailers were significant determinants of clicking the lowest priced offer from legit analysis. We also applied Tobit regression analysis to estimate the price premium of the two determinants, but only reputation of retailers was found to have price premium of 4.9%.

  • PDF

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Modeling Service based on XML Schema for MPEG Multimedia Middleware

  • Hendry Hendry;Kim Mun-Churl
    • 한국멀티미디어학회지
    • /
    • 제10권1호
    • /
    • pp.114-128
    • /
    • 2006
  • Recently MPEG (Moving Picture Experts Group) has started a new standardization activity called MPEG Multimedia Middleware (M3W). The M3W supports multimedia applications Independent of hardware and software such as operating systems so that the portability and interoperability of multimedia applications are greatly improved. In doing so, the M3W adopts the concept of a service-based middleware. The M3W standardizes a set of multimedia Application Programming Interfaces (APIs) and their implementations can be pro vided by third parties In the form of services. In this paper, we introduce the usage of XML metadata in describing the standard multimedia APIs and third party's services and also we explain the role of the XML Schema within the M3W in providing transparent access from application to the M3W services.

  • PDF