• Title/Summary/Keyword: android application

Search Result 796, Processing Time 0.03 seconds

An Android Birthmark based on API k-gram (API k-gram 기반의 안드로이드 버스마크)

  • Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.177-180
    • /
    • 2013
  • A software birthmark means inherent characteristics that can be used to identify a program. Because the software birthmark is difficult to remove by simple program transformation, it can be used to detect code theft. In this paper, we propose a birthmark technique based on API k-gram of Android applications. Android SDK provides various libraries that help programmers to develop application easily. In order to use Android SDK, we have to use API method calls. The API call instructions are hard to be replaced or removed, so they can be a inherent characteristics of an application. To show the effectiveness of the proposed birthmark, we compared it with previous birthmarks and evaluated it with open source applications. From the experiments, we verified that the credibility and resilience of our birthmark is higher than previous birthmarks.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

Inforamtion Application for The blind people (시각 장애인을 위한 안내정보 어플리케이션)

  • Shin, Eun-bi;Roh, Tae-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.358-359
    • /
    • 2018
  • In this paper, opencv and android studio are used to distinguish between objects ahead of the blind. When the movement is detected in a positive direction in connection with the camera of the smartphone, the user is informed that the part of the camera is being rabelified and continues to track using the mean shift algorithm. A C ++ program based on OpenCV-based was used for real-time motion observation and the application will be produced by android studio. As a result of the study, objects that move with Labeling are identified and the box area is specified using the mean shift algorithm to move the box along with the object to track objects in real time.

  • PDF

Android Application for Connecting Cycling Routes on Strava Segments

  • Mulasastra, Intiraporn;Kao-ian, Wichpong
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.142-148
    • /
    • 2019
  • Relatively few countries provide separate bicycle lanes for cyclists. Hence, tools for suggesting cycling routes are essential for a safe and pleasant cycling experience. This study aims to develop a mobile application to build cycling routes based on user preferences, specifically location, search radius, ride distance, and number of optimal routes. Our application calls the Strava API to retrieve Strava cycling segments crowdsourced from the cycling community. Then, it creates a graph consisting of the start and end points of these segments. Beginning from a user-specified location, the depth-first search algorithm (DFS) is applied to find routes that conform to the user's preferences. Next, a set of optimal routes is obtained by computing a trade-off ratio for every discovered route. This ratio is calculated from the lengths of all segments and the lengths of all connecting paths. The connected routes can be displayed on a map on an Android device or exported as a GPX file to a bike computer. Future work must be performed to improve the design of the user interface and user experience.

Overview of the Sambodana Project: Development of Mobile Communication Security System using Hardening Android

  • Cahyo, Darujati;Moh Noor Al, Azam
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.57-62
    • /
    • 2022
  • The Sambodana project is a mobile communication security system development project using Hardening Android. The initial idea for this project is that information leakage occurs outside of a communications application with end-to-end cryptographic security. Android hardening prevents unwanted applications and bloatware from being installed, such as unavailable Google Play Store or install restrictions.

Activity-based Event Capture and Replay Technique for Reproducing Crashes in Android Applications (안드로이드 어플리케이션의 결함 재생을 위한 액티버티 단위의 이벤트 캡춰 및 재생 기법)

  • Jha, Ajay Kumar;Lee, Woo Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2014
  • As Android platform and its applications are widely used, it is necessary to assure the reliability and safety of Android applications. The capture and replay technique is widely used for reproducing the crashes in Java applications. In this paper, we adapt the context-based capture and replay technique to Android applications by considering Android activity structure and its GUI characteristics. Our capture and replay technique uses probe code insertion based on AspectJ for minimizing the original code change and for enhancing the efficiency and reusability of the probe codes. For proving the efficiency of our technique, we provide a case study and execution overhead comparisons with related works, in which our approach has merits in GUI oriented Android applications with relatively low execution overhead.

A Study on the Voice Interface for Mobile Environment (모바일기반 음성인터페이스에 관한 연구)

  • Kim, Soo-Hoon;Ahn, Jong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.199-204
    • /
    • 2013
  • Google's android-based voice interface is limited to the web application and the users are rare. In this paper, We suggest the method that can be done using existing android-based voice engine and develope voice application. We also study the environments of android-based voice interface and present the appropriate voice interface in mobile environment.

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol

  • Kim, Kang Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.405-412
    • /
    • 2014
  • Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.

A User-defined NFC Tag Application on Android (Android를 이용한 맞춤 NFC 태그 애플리케이션)

  • Ryu, Yeon-Joong;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.291-294
    • /
    • 2014
  • 본 논문에서는 Android를 기반으로 NFC(Near Field Communication) 스티커를 태그 하는 행위를 통해 별도의 터치 없이 자신이 원하는 여러 작업들을 실행할 수 있는 NFC의 장점을 이용하여 운전 중/ 강의 중 등의 특정 상황에서 사용자가 원하는 작업을 빠르고 간단하게 할 수 있도록 하는 맞춤 NFC 태그 애플리케이션을 개발하였다. 본 애플리케이션의 기능은 한 번의 태그만으로 운전 중에 필요한 작업(구글지도, 뮤직플레이어 등), 강의에 필요한 작업(모바일 학생증, 화면밝기 최대, 진동모드 등)을 동시에 적용할 수 있으며 자신의 연락처 정보를 상대방의 단말기에 저장 시킬 수 있고, 제공되는 작업 이외에 사용자가 원하는 작업을 정의할 수 있도록 하였다.

  • PDF