Fig. 1. Infection code through packing file[12]
Fig. 3. Aurasium layer correspondence[16]
Fig. 4. processing process
Fig. 5. binder_transaction detail processing
Fig. 6. Warning screen
Fig. 7. IPC delivery process
Fig. 8. Docker compose configuration
Fig. 9. Part of sample programs
Fig. 10. Packet analysis capture screen via wirewhark
Fig. 11. xml screenshot for results
Fig. 12. Check for malware detection and screen for route confirmation
Fig. 13. Performance evaluation graph
Fig. 2. TraintDroid layer correspondence[15]
Table 1. Smart trading market growth rate forecast[4]
Table 2. Characteristics of Blockchain[6]
Table 3. Scenario using Blockchain technology[8]
Table 4. Malicious code type classification[13,14]
Table 5. part of Struct for detection code
Table 6. Experiment environment
Table 7. Performance evaluation
References
- Min.K.S, "Online shopping trend survey," National Statistical Office, 2019.
- Lee.S.H, "Device Authentication for Smart Grid System Using Block Chain," KAIST, 2016.
- The Cointelegraph, A Brief History of Ethereum From Vitalik Buterin's Idea to Release, https://cointelegraph.com/news/ethereum-101-from-idea-to-release
- Information and Communication Policy Institute, "Online marketing trend, " 2018
- Lim.M.H, "Impacts and Implications of Block Chain Technology," Information and Communication Technology Promotion Center, 2017.
- Kang.S.J, "Understanding and Development Status of Block Chain Technology and Implications," The 4th Industrial Revolution and Soft Power Issue Report by the Information and Communication Industry Promotion Agency, No.13, 2018.
- Block Chain & PinTech leads 'smart finance,' http://www.etnews.com/20180816000425
- Ernst & Young Global Limited, https://www.ey.com/kr/ko/home
- 5Miles, https://www.5mils.com
- Block Chain - Fancy or Innovative, http://news.khan.co. kr/kh_news/khan_art_view.html?artid=201902070600055&code=940100
- Gartner, https://www.gartner.com/en
- Mcafee, https://www.mcafee.com/ko-kr/index.html
- Zhou,Y.,& Jiang,X, "Dissecting android malware:Charac terizationand evolution.InSecurityandPrivacy," 2012 IEEE Symposium pp.95-109, 2012.
- JIANG. X, "Gingermaster: First andorid malware utilzing a root exploit on android 2.3," NC State University,2011.
- William Enck & Peter Gilbert & Byung-Gon Chun, "TaintDroid:aninformation-flow trackingsystem forrealtimeprivacy monitoring on smartphones, " InProceeding sof the 9th USENIX conference on Operating systems design and implementation, pp.1-6, 2014.
- Xu.R. & Saidi.H & Anderson.R, "Aurasium:Practical policy enforcement for android applications," InProceeding sof the 21st USENIX conferenceon Security symposium, pp.27-27, 2012.