• Title/Summary/Keyword: official app

Search Result 8, Processing Time 0.021 seconds

A Framework Development for Fake App Detection and Official App Information Sharing (가짜 앱 탐지 및 공식 앱 정보 공유 프레임워크 개발)

  • Jinwook Kim;Yujeong No;Wontae Jung;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.213-214
    • /
    • 2023
  • 스마트폰은 앱을 통하여 사람들에게 다양하고 유용한 기능을 제공하며, 새로운 앱들이 계속해서 개발되어 출시되고 있다. 그러나 이러한 긍정적인 측면에서 불구하고, 사람들의 편리한 사용에 대한 욕구를 이용하여, 신종 앱 사기와 같은 범죄가 발생하고 있으며, 이를 악용하여 금전적으로 피해를 주거나 개인정보를 탈취하는 범죄로가 증가되는 추세이다. 이와 같은 앱으로 인한 범죄를 대응하기 위하여, 신종 앱 사기 범죄를 분석하고 해결하는 방안이 요구되는 실정이다. 따라서 본 논문에서는 신종 앱 사기 범죄에 악용되는 가짜 앱을 탐지하고, 공식 기관에서 제공하는 정보를 기반으로 가짜 앱과 공식 앱에 대한 대량의 정보를 공유하는 프레임워크를 개발한다. 개발한 프레임워크를 통하여, 정보를 공유한 사람들에게 가짜 앱에 대한 정보를 알려주고, 공식 기관의 앱을 확인하는 안전한 모바일 환경을 제공할 것으로 사료된다.

  • PDF

A Client-Side App Model for Classifying and Storing Documents

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif;Khalifa, Mahmoud;Alsharani, Mohammed Mujib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.225-233
    • /
    • 2022
  • Due to the large number of documents that are important to people and many of their requests from time to time to perform an essential official procedure, this requires a practical arrangement and organization for them. When necessary, many people struggle with effectively arranging official documents that enable display, which takes a lot of time and effort. Also, no mobile apps specialize in professionally preserving essential electronic records and displaying them when needed. Dataset consisting of 10,841 rows and 13 columns was analyzed using Anaconda, Python, and Mito Data Science new tool obtained from Google Play. The research was conducted using the quantitative descriptive approach. The presented solution is a model specialized in saving essential documents, categorizing according to the user's desire, and displaying them when needed. It is possible to send in an image or a pdf file. Aside from identifying file kinds like PDFs and pictures, the model also looks for and verifies specific file extensions. The file extension and its properties are checked before sharing or saving it by applying the similarity algorithm (Levenshtein). Our method effectively and efficiently facilitated the search process, saving the user time and effort. In conclusion, such an application is not available, which facilitates the process of classifying documents effectively and displaying them quickly and easily for people for printing or sending to some official procedures, and it is considered one of the applications that greatly help in preserving time, effort, and money for people.

Detecting Repackaged Applications using the Information of App Installation in Android Smartphones (안드로이드 스마트폰에서 앱 설치 정보를 이용한 리패키징 앱 탐지 기법)

  • Joun, Young Nam;Ahn, Woo Hyun
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • In recently years, repackaged malwares are becoming increased rapidly in Android smartphones. The repackaging is a technique to disassemble an app in a market, modify its source code, and then re-assemble the code, so that it is commonly used to make malwares by inserting malicious code in an app. However, it is impossible to collect all the apps in many android markets including too many apps. To solve the problem, we propose RePAD (RePackaged App Detector) scheme that is composed of a client and a remote server. In the smartphone-side, the client extracts the information of an app with low CPU overhead when a user installs the app. The remote server analyzes the information to decide whether the app is repackaged or not. Thus, the scheme reduces the time and cost to decide whether apps are repackaged. For the experiments, the client and server are implemented as an app on Galaxy TAB and PC respectively. We indicated that seven pairs of apps among ones collected in official and unofficial market are repackaged. Furthermore, RePAD only increases the average of CPU overhead of 1.9% and the maximum memory usage of 3.5 MB in Galaxy TAB.

Permissions based Automatic Android Malware Repair using Long Short Term Memory (롱 숏 텀 메모리를 활용한 권한 기반 안드로이드 말웨어 자동 복구)

  • Wu, Zhiqiang;Chen, Xin;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.387-388
    • /
    • 2019
  • As malicious apps vary significantly across Android malware, it is challenging to prevent that the end-users download apps from unsecured app markets. In this paper, we propose an approach to classify the malicious methods based on permissions using Long Short Term Memory (LSTM) that is used to embed the semantics among Intent and permissions. Then the malicious method that is an unsecured method will be removed and re-uploaded to official market. This approach may induce that the end-users download apps from official market in order to reduce the risk of attacks.

  • PDF

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

A Study on Environmental Traits and Significance of Eouidongji Pond(於義洞池) Area in Dongchon(東村), Hanseong-bu(漢城府) (한성부 동촌(東村) 어의동지(於義洞池) 일대의 환경 특성과 장소적 의미)

  • Gil, Ji-Hye;Son, Yong-Hoon;Hwang, Kee-Won
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.2
    • /
    • pp.1-14
    • /
    • 2017
  • The purpose of this study is to understand the environmental traits and significance of the pond place that appears in historic maps in 'Dongchon(東村)', which is the eastern section within the fortress wall of Hanyang. We reviewed various documents and maps to identify the name of the pond, and of those materials we followed the name provided by official national records and geographical titles to designate it 'Eouidongji Pond(於義洞池).' The results of the research showed, first, that from the standpoint of location and environmental characteristics, that the area of the Eouidongji Pond was an area that contained a pastoral atmosphere within the city. It was located in an area where the waters flowing from the mountains gathered, and the boundaries of the pond would change based on water levels within a plot of land about 2,000pyeong(app. $6,600m^2$) in size. Second, when seen from the perspective of its creation background, the Eouidongji Pond seems to have been a naturally occurring pond which was modified when the water system was managed in the city at the beginning of the dynasty. In addition to its role as a reservoir, it was operated as a lotus pond(蓮池) to offer lotus(蓮) related by-products. With the nearby detached palace being actively used, it seems the pond was managed at the same time. The pond had already been filled in by the early 20th century, and although there were efforts to reconstruct the pond, it was eventually destroyed as the area was included in the site of a school during the colonial period. Third, the Eouidongji Pond was appreciated in many cases by individuals or admired as part of the natural landscape by viewing it from afar. In addition, it provided entry landscape near the road entering Dongchon, and was a location that was easily visited in connection with other nearby pleasure grounds. Through studying the location and environmental characteristics, the background of its creation and destruction, operation and management by time period, usage at the time, and characteristics of scenery appreciation of Eouidongji Pond, the Eouidongji Pond was a pond of high practical value to the nation, as it supplemented the water system in the city and was able to provide lotus harvests for the nation. In addition, from a urban environment perspective, it was a lateral landmark with a large area, as well as an effective boundary. It was an open area that the people of the Hanseong-bu could freely use, and it had a high public value due to its ease of accessibility.