• Title/Summary/Keyword: Android O.S

Search Result 13, Processing Time 0.026 seconds

Forensic data extracts of Android and Windows Mobile O.S. Smart Phone (Google Android와 Windows Mobile Smart Phone의 포렌식 자료 추출)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.235-239
    • /
    • 2010
  • Use of mobile phones reached saturation point, the recent use of the iPhone, including the Smart Phone is increasing rapidly. How to extract forensic data from current mobile phones and SYN, JTAG, Revolving There are three ways. Mobile phone and Smart Phone, but the technology and how to use forensic data because of the difference must have different extraction methods. In this paper, in the Smart Phone will study how to extract forensic data. Commonly used in the Google Android Smart Phone and Windows Mobile Smart Phone OS in the specification and analysis for analysis, the data analysis. Also, Google Android and Windows Mobile Smart Phone to extract forensic data to generate evidence. The present study tested the Mobile Smart Phone technology research will contribute to the development of forensic techniques.

  • PDF

Design and Implementation of Harmful Video Detection Service using Audio Information on Android OS (안드로이드 OS 기반 음향 정보를 이용한 유해동영상 검출 서비스의 설계 및 구현)

  • Kim, Yong-Wun;Kim, Bong-Wan;Choi, Dae-Lim;Ko, Lag-Hwan;Kim, Tae-Guon;Lee, Yong-Ju
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.577-586
    • /
    • 2012
  • The smartphone emerged due to the rapid development of the Internet has brought greater convenience to life in a positive manner. Recently, however, because of unconstrained exposure to harmful video, reckless use of smart phones has become a domestic issue in our society. In this paper, a service which detects harmful videos by using the acoustic information is designed and implemented on the Android OS. In order to implement the service of Android OS-based detection of the harmful movie, the speed of existing sound-based detection method for harmful videos is improved. The GMM(Gaussian Mixture Model) was used for classifier and the number of Gaussian Mixture was 18. The implemented service shows a detection rate of 97.02% for a total of 1,210 data files (approximately 687 hours) which comprises 669 general videos files (about 424 hours) and 541 harmful video files (about 263 hours). It's speed is 5.6 times faster than the traditional methods whitout reducing the detection rate.

Design and Implementation of a Mobile Terminal-Based Guidance System for the Blind (시각 장애인을 위한 휴대 단말 기반의 안내 시스템 설계 및 구현)

  • Lee, Seung-Soon;Lee, Yeong-Ju;Ryu, Wan-Hyung;Song, Min-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1558-1559
    • /
    • 2010
  • 본 논문에서는 휴대 단말기를 이용하여 시각장애인들을 위한 장애물 안내시스템을 설계 및 구현한다. 휴대성을 높이기 위해 시스템을 주제어기와 부제어기로 분리시키고, Zigbee 통신을 이용하여 두 디바이스 간에 정보를 주고 받는 형태로 설계하였다. 주제어기는 부제어기로부터 전송된 전방의 장애물 정보를 취합하고 판단하여 사용자에게 제공하는 기능을 하고, 부제어기는 6개의 초음파 센서를 갖는 모듈로서 초음파센서를 이용하여 전방 장애물과의 거리를 지속적으로 측정하여 주제어기로 전송하는 기능을 한다. 최근 이슈가 되고있는 Android O/S 기반의 휴대용 단말기를 기반으로 설계 및 구현하였기 때문에 Android O/S 기반의 다양한 휴대용 단말기에 적용이 가능하다.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

Implementation of ISO/IEEE 11073-10404 Monitoring System Based on U-Health Service (유헬스 서비스 기반의 ISO/IEEE 11073-10404 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.625-632
    • /
    • 2014
  • The u-health service is using portable device such as smart device and it consists of small computing device. The u-health service carry out same performance with desktop computer. We designed message structure based on Bluetooth HDP. This message structure is used to transmit patient's biometric data on the smart device of medical team, patient and family over the mobile network environment. ISO/IEEE 11073 PHD standard was defined based on the method of communication between the agent and the manager. And We are confirmed the reliable transmission of biometric data at the smart device by implementing the android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

Design and Implementation of a Low-Code/No-Code System

  • Hyun, Chang Young
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.188-193
    • /
    • 2019
  • This paper is about environment-based low-code and no-code execution platform and execution method that combines hybrid and native apps. In detail, this paper describes the Low-Code/No-Code execution structure that combines the advantages of hybrid and native apps. It supports the iPhone and Android phones simultaneously, supports various templates, and avoids developer-oriented development methods based on the production process of coding-free apps and the produced apps play the role of Java virtual machine (VM). The Low-Code /No-Code (LCNC) development platform is a visual integrated development environment that allows non-technical developers to drag and drop application components to develop mobile or web applications. It provides the functions to manage dependencies that are packaged into small modules such as widgets and dynamically loads when needed, to apply model-view-controller (MVC) pattern, and to handle document object model (DOM). In the Low-Code/No-Code system, the widget calls the AppOS API provided by the UCMS platform to deliver the necessary requests to AppOS. The AppOS API provides authentication/authorization, online to offline (O2O), commerce, messaging, social publishing, and vision. It includes providing the functionality of vision.

Restaurant Recommendation System Using GPS in Smartphones (스마트폰의 GPS를 이용한 음식점 추천 시스템)

  • Kwon, O-Deuk;Lee, Hyun-Woo;Kim, Young-Ah;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1330-1332
    • /
    • 2012
  • 휴대전화에 인터넷 통신과 정보검색 등 컴퓨터 지원 기능을 추가한 스마트폰이라 불리는 지능형 단말기가 등장하여 우리의 일상생활에 깊이 관여하고 생활의 패턴을 바꾸는 큰 변화를 불러왔다. 현재 음식추천 어플리케이션들은 대부분 주변의 음식점의 위치나 메뉴 정보 등을 제공하고 있다. 본 논문에서는 음식 추천방식에 룰렛을 이용하여 게임 형식의 음식추천이 가능하게 하였으며 구글 맵 기능을 활용하여 현재위치에서 내가 찾는 음식점 중에 반경을 입력하면 그 반경 안에 있는 음식점들을 검색하도록 Android 운영체제를 기반으로 한 어플리케이션을 개발하였다.

The Design and Implementation of Location Information System using Wireless Fidelity in Indoors (실내에서 Wi-Fi를 이용한 위치 정보 시스템의 설계 및 구현)

  • Kwon, O-Byung;Kim, Kyeong-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.243-249
    • /
    • 2013
  • In this paper, GPS(Global Positioning System) that can be used outdoors and GPS(Global Positioning System) is not available for indoor Wi-Fi(Wireless Fidelity) using the Android-based location information system has been designed and implemented. Pedestrians in a room in order to estimate the location of the pedestrian's position, regardless of need to obtain the absolute position and relative position, depending on the movement of pedestrians in a row it is necessary to estimate. In order to estimate the initial position of the pedestrian Wi-Fi Fingerprinting was used. Most existing Wi-Fi Fingerprinting position error small WKNN(Weighted K Nearest Neighbor) algorithm shortcoming EWKNN (Enhanced Weighted K Nearest Neighbor) using the algorithm raised the accuracy of the position. And in order to estimate the relative position of the pedestrian, the smart phone is mounted on the IMUInertial Measurement Unit) because the use did not require additional equipment.

Blockchain Technology for Mobile Applications Recommendation Systems (모바일앱 추천시스템과 블록체인 기술)

  • Umekwudo, Jane O.;Shim, Junho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.129-142
    • /
    • 2019
  • The interest in the blockchain technology has been increasing since its inception and it has been applied to many fields and sectors. The blockchain technology creates a decentralized environment where no third party controls the data and transaction. Mobile apps recommendation has been extensively used to recommend apps to mobile users. For example, Android-based recommendation applications have been developed to recommend other mobile apps for download depending on user's preferences and mobile context. These recommendations help users discover apps by referring to the experiences of other users. Due to the collection of a large amount of data and user information, there is a problem of insecurity and user's privacy that are prone to be attacked. To address this issue the blockchain technology can be incorporated to assure cryptographic safety. In this paper, we present a survey of the on-going mobile app recommendations and e-commerce technology trend to address how the blockchain can be incorporated into the collaborative filtering recommendation systems to enable the users to set up a secured data, which implies the importance of user privacy preference on personalized app recommendations.