• Title/Summary/Keyword: 안드로이드 보안 플랫폼

Search Result 47, Processing Time 0.032 seconds

안드로이드 어플리케이션 역공학 보호기법

  • Ha, Dongsoo;Lee, Kanghyo;Oh, Heekuck
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.19-28
    • /
    • 2015
  • 현재 가장 높은 점유율을 보이고 있는 스마트 모바일 디바이스 플랫폼인 안드로이드는 바이트코드 기반의 어플리케이션을 동작시킨다. 바이트코드는 특성상 역공학에 취약하여 원본 코드의 노출이나 수정 후 재배포가 쉽게 이루어질 수 있다. 이를 보완하는 방법으로 난독화, 실행압축, 코드 분리, 기타 안티 리버싱 기법 등이 존재하지만, 이런 보호기법을 단독으로 사용하면 그 효과가 높지 않다. 이들은 각각 장단점을 가지고 있는데, 여러 기법을 조합해서 사용하면 보안성을 한층 높일수 있다. 그렇다고 각 기법의 특징을 무시한 채 무작정 사용하게 되면 오히려 어플리케이션의 성능이 낮아지고 크기가 늘어나는 문제가 발생한다. 따라서 보호기법의 정확한 이해와 필요에 맞는 올바른 선택적 사용이 중요하다. 본 논문에서는 지금까지 사용되어 온 안드로이드 어플리케이션 역공학 보호기법의 유형과 특징에 대하여 살펴보고, 보안성을 높이기 위한 올바른 조합과 선택에 대해 고찰한다.

Analysis on Permission Usage and Risk of Android Apps (안드로이드 앱의 퍼미션 사용현황 및 위험성 분석)

  • Kim, Youn-Gi;Kim, Jae-Gon;Park, Gyeon-Yong;Han, Seong-Bong;Cho, Taename
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.449-452
    • /
    • 2014
  • 구글 안드로이드 플랫폼은 여러 보안기능을 제공하는데 그 중 하나는 퍼미션(permission)이다. 만약 퍼미션이 오용 될 경우 보안상의 위험이 발생할 수 있다. 본 논문에서는 민감한 정보를 다루는 은행 앱에 대한 퍼미션 사용 현황과 안드로이드의 퍼미션 체계에 대한 문제점을 분석하며 이을 해결하기 위한 대응 방안을 제시한다.

Apple의 사이드로딩 허용이 사이버 보안에 미치는 영향

  • Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.1
    • /
    • pp.65-76
    • /
    • 2023
  • 스마트폰 환경에서 사이드로딩 이란, 플랫폼 사업자의 심사 및 승인없이 앱을 스마트폰에 설치하는 것을 의미한다. 즉, 공식적인 앱 마켓을 통하지 않고 제3의 앱마켓 또는 인터넷에서 설치파일을 직접 다운로드하여 설치하는 과정을 말한다. 여기서 제3의 앱마켓이란 플랫폼 사업자가 공식적으로 관리하는 앱 스토어를 제외한 모든 앱 마켓을 의미한다. 본고에서는 사이버 보안 관점에서 제3의 앱마켓 및 사이드로딩 허용여부로 인해 발생하는 사회적 문제점을 고찰하고자한다. 특히, 제3의 앱마켓 및 사이드로딩을 제도적으로 허용하고 있는 안드로이드 환경에서 발생하고 있는 사회적 문제점들을 바탕으로 iOS 환경에서도 제3의 앱마켓 및 사이드로딩이 허용되는 경우, 사이버 보안 관점에서 예상되는 사회적 문제점들을 알아보고자 한다.

In the Automation Environment of Factory and Production, the Implementation of Security-enhanced Mobile Device Management System using Android-based Smart Phones (공장 및 생산 자동화에 있어 안드로이드 기반의 보안성이 강화된 모바일장비관리시스템 구현)

  • Yu, Hyung-Cik;Seon, Ki-Hyun;Kim, Sung-Un
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.779-789
    • /
    • 2014
  • Utilizing smart phones based on android applications in the field of FA(Factory Automation) or PA(Production Automation) is being deployed actively. In general, MDM(Mobile Device Management) is a crucial infra-structure to build such a FA or PA environment. In this paper, we suggest an open mobile device management platform and implement its prototype. The developed prototype consists of three modules such as DMS(Device Management Server), FUMO(Firmware Update Management Object) and SCOMO(Software Component Management Object). In addition, we suggest a security module based on the concept of the EAP (Extensible Authentication Protocol) and the AES (Advanced Encryption Standard). The suggested security module's prototype is applied to guarantee the data integrity in the process of communicating among DMS, FUMO and SCOMO for the purpose of utilizing smart phones based on android applications in a FA field. We also evaluate the performance of the implemented security prototype. According to our simulation results, the implemented prototype has a good performance in a FA environment and can be utilized in the other FA, PA or OA(Office Automation) environment with guaranteeing the security.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices (안드로이드 단말에서의 상황별 위험도 분석 및 상황별 위험도 기반 지속인증 기법)

  • Kim, Jihwan;Kim, SeungHyun;Kim, Soo-Hyung;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1154-1164
    • /
    • 2016
  • To prevent the use of one's smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone's security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.

A Study on Implementation of Android Security System Based on SELinux (SELinux 기반 안드로이드 보안시스템 구축에 관한 연구)

  • Jeong, Seong-Hwa;Lho, Tae-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3005-3011
    • /
    • 2010
  • As soon as high-performanced smart phones is rapidly emerging in recent, its security problems come to the front. Especially in case of an open platform, it is easy to be a target of virus. Many security solution industries such as Symantec and Ahnlab are developing a mobile security system, but they have not yet a commercial product. We developed the effective security function of Android system based on SELinux to solve this problem, and verified its performance by applying the user applications developed to S3C6410 board.

Efficient Detection of Android Mutant Malwares Using the DEX file (DEX 파일을 이용한 효율적인 안드로이드 변종 악성코드 탐지 기술)

  • Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.895-902
    • /
    • 2016
  • Smart phone distribution rate has been rising and it's security threat also has been rising. Especially Android smart phone reaches nearly 85% of domestic share. Since repackaging on android smart phone is relatively easy, the number of re-packaged malwares has shown steady increase. While many detection techniques have been proposed in order to prevent malwares, it is not easy to detect re-packaged malwares by static analysis and it is also difficult to operate dynamic analysis in android smart phone. Static analysis proposed in this paper features code reuse of repackaged malwares. We extracted DEX files from android applications and performed static analysis using class names and method names. This process doesn't not include reverse engineering, so it is possible to detect malwares efficiently.

A Study of Android Launcher based on Application Virtualization (어플리케이션 가상화를 적용한 안드로이드 런처 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2013
  • Recently, Virtualization technology is moving the desktop environment from its place a mobile platform environment, personal and businesses, academia, and lacked security and in a team environment brought about many changes are coming. In this environment, a representative of VMware's MVP solution and Enterporid Divide. But, another issue is that these mobile virtualization technologies in an environment of limited resources and performance constraints, have become its application virtualization technology to improve the weaknesses of the mobile platform. In this paper, proposed for client-based desktop application virtualization infrastructure, bring it to the Android environment, weaknesses of the existing paper was user area limitations of the desktop environment with application virtualization, program execution android application virtualization launcher was improved through increased resource allocation.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.