• Title/Summary/Keyword: Zombie Smartphone

Search Result 5, Processing Time 0.021 seconds

A Study on Feature Extraction and Response Technology of Zombie Smartphone (좀비 스마트폰 특징 추출 및 대응기술 연구)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1374-1379
    • /
    • 2015
  • Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.

Response Guide of Smart-Phone Malware Using PC (PC를 이용한 스마트폰 악성코드 대응)

  • Yoon, Poong-Sik;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1835-1841
    • /
    • 2013
  • With the increase in smartphone users, attacks targeting smartphone malware, zombie smartphone, such as smart phones is increasing. Security of smart phones is more vulnerable than PC security, for a zombie smartphone and generates a serious problem than the zombie PC attack on the smartphone every day is diversification. In this paper, the comparative analysis of malicious code and smartphone DDoS attacks and DDoS attacks from the PC, When using a service by connecting to the data network, proposes a method for users to confirm the packet smartphone direct a method for detecting by using the PC malware Smart PC Phone. Propose the measures of malicious code and smartphone DDoS attacks.

A Study on Feature Extraction of Zombie Smartphone (좀비 스마트폰 특징 추출에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.222-223
    • /
    • 2015
  • Malicious network attacks such as DDoS is no clear preparedness, the damage is also a bar. In particular, when a smartphone is infected to the zombies, the damage such as communication fee billing and leakage of personal information with numerous network failures are expected. In this study, with reference of the features that appear in a zombie PC we extract the zombie smartphone's phenomena and features that appear while the zombie service is running.

  • PDF

Implementation of the Smombie (smartphone zombie) VR experience game using Google Cardboard and Bluetooth controller (구글 카드보드와 블루투스 컨트롤러를 이용한 스몸비(스마트폰 좀비) VR 체험 게임)

  • Kim, Ji-hyun;Seo, Mi-hye;Yang, Seon-young;Lee, Bo-hyun;Jin, I-seul;Park, Su e;Park, Jung-kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.212-215
    • /
    • 2017
  • In this paper, VR game was produced to inform the danger of using smartphone while walking and to raise awareness. In this VR games, you can experience Smombie (smart phone and zombie compound word) like a real situation by using Google card board and Bluetooth controller. Designed as a directions game of everyday material, the user indirectly experiences the dangerous situations that may actually occur in everyday life. In the virtual space, you can see the map on the smartphone, navigate the route, and send text messages using the controller during the game. We will explain how to implement smartphone map and send text message using controller which are the main functions of VR game.

  • PDF

The Techno-mediated Rebirth of Young Precariat's Working Conditions Today (동시대 청년 알바노동의 테크노미디어적 재구성)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.83
    • /
    • pp.157-185
    • /
    • 2017
  • The present study examines the dialectic tensions arising within the ICT-mediated labor culture between the dominant power of conglomerates and the precarious labor subjects in the labor practices, as smartphones and tablet PCs have grown in popularity. The present study explores how much young precarious workers named 'Cheongyeon Alba' (young precariat in S Korea) suffers from continually precarious job positions as temporary staff or contract workers, being trapped at the bottom of the pay scale, and also being electronically connected to the workplace in a seamless way. Concretely, this study investigates how the mobile phone becomes deeply entangled with the 'precarious' labor culture in the metropolitan city of Seoul. The mobile precariat has been in a disadvantaged position, in terms not only of the moral issue of exploitation in business but also of social injustice. Labor exploitation of young workers has been reinforced by the mobile labor culture, in which they are remotely monitored by live surveillance mobile apps, and mobile instant messaging from a boss can intrude incessantly into their private life. This study depicts the extension of the business's surveillant power by mobilizing the mobile phone in the working practices.

  • PDF