• Title/Summary/Keyword: Android applications

Search Result 418, Processing Time 0.025 seconds

Activity based state diagram generation for White-box testing of Android applications (안드로이드 어플리케이션의 화이트박스 테스트를 위한 액티비티기반의 상태도 생성기법)

  • Baek, Tae San;Jha, Ajay Kumar;Lee, Woo Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1198-1199
    • /
    • 2012
  • 본 논문에서는 안드로이드 어플리케이션의 화이트박스 테스트를 위해 안드로이드의 특성인 액티비티의 라이프사이클을 고려하여 상태도를 생성하는 기법에 대한 연구이다. 상태도를 생성 하기 위해 소스코드에서 역공학을 통해 생성된 호출그래프에 어플리케이션내의 여러 액티비티의 라이프 사이클정보를 추가하여 액티비티 상태도를 생성한다.

Developing a Smart Phone Application for the OMAHA System Guidelines (오마하 시스템 가이드라인의 스마트폰 애플리케이션 개발)

  • Hong, Hae-Sook;Lee, In-Keun;Hong, Sung-Jung;Kim, Hwa-Sun
    • Research in Community and Public Health Nursing
    • /
    • v.21 no.4
    • /
    • pp.512-521
    • /
    • 2010
  • Purpose: The remarkable progress in information and communication technology has had a great effect on the healthcare delivery system. The development of smart phone applications is a new field. The aim of our research was to provide assistance in developing smart phone applications for community health nursing. Methods: Based on an informative approach, this study developed persona and site maps, followed by a storyboard as a way of analyzing users' requirements and designing responses in the context of smart phone application development methodology. Results: We developed persona, user interface and database design successfully, and then seven nurses selected four nursing problems (income, residence, pain, and digestion hydration). The search time in seconds for the 2005 English OMAHA guidelines to find three nursing interventions for these problems was used to evaluate the effectiveness of the smart phone application. The results showed that smart phone applications' search was 21 times faster on the average than book guidelines. Conclusion: An English version of the OMAHA system application was developed for the Android smart phone market. It is hoped that smart phone applications such as this will be used internationally for nursing education.

Open API-based Conversational Voice Interaction Scheme for Intelligent IoT Applications for the Digital Underprivileged (디지털 소외계층을 위한 지능형 IoT 애플리케이션의 공개 API 기반 대화형 음성 상호작용 기법)

  • Joonhyouk, Jang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.22-29
    • /
    • 2022
  • Voice interactions are particularly effective in applications targeting the digital underprivileged who are not proficient in the use of smart devices. However, applications based on open APIs are using voice signals only for short, fragmentary input and output due to the limitations of existing touchscreen-oriented UI and API provided. In this paper, we design a conversational voice interaction model for interactions between users and intelligent mobile/IoT applications and propose a keyword detection algorithm based on the edit distance. The proposed model and scheme were implemented in an Android environment, and the edit distance-based keyword detection algorithm showed a higher recognition rate than the existing algorithm for keywords that were incorrectly recognized through speech recognition.

A Study on the Vulnerability of Security Keypads in Android Mobile Using Accessibility Features (안드로이드 접근성(Accessibility) 기능을 이용한 보안키패드의 취약점 공격 및 대응 방안)

  • Lee, Jung-Woong;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.177-185
    • /
    • 2016
  • As the fintech industry is growing at an incredible rate, mobile phones are positioned as the most important tool for financial transaction. However, with a rising number of malware applications, the types of attack and illegal access to mobile device are becoming more diverse and sophisticated. This paper studies the potential keylogger attack by exploiting the Accessibility Service in Android framework. This type of attack allows the malicious individual to use keylogger on the victim's Android mobile phone to steal passwords during mobile financial transaction regardless of security keypad setting. Lastly the paper proposes solutions to counter these types of attack by verifying the accessibility usage and amending the application guideline for accessibility.

Implementation of Personal Energy Management System Using DDNS (DDNS를 이용한 개인 에너지 관리 시스템 구현)

  • Jeong, Nahk-Ju;Lee, Chun-Hee;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1321-1326
    • /
    • 2015
  • The amount of smart phones has increased exponentially. Due to the periodic release of high-performance smart phones and upgraded operating system, new smart phones become out-dated over 1 or 2 years. In order to solve environmental constraints of these smart phones, virtualization technology using Thin-Client terminal has been developed. However, in the case of Virtual Machine(VM), the applications associated with sensors and a GPS device can not run because they are not included. In this paper, by implementing the device driver for Android running in a virtual machine in the x86-based systems, it is to provide Android virtualization capabilities such as using the latest smart phones in the virtual machine environment. It would like to propose a method that the virtual device driver receives sensors and GPS information from the old Android smart phones(Thin-Client) that actually work and run as if the real device exists.

The Implementation and Performance Measurement for Hadoop-Based Android Mobile TPC-C Application (모바일 TPC-C: 하둡 기반 안드로이드 모바일 TPC-C 어플리케이션 구현 및 성능 측정)

  • Jang, Han-Uer;No, Jaechun;Kim, Byung-Moon;Lee, Ji-Eun;Park, Sung-Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.203-211
    • /
    • 2013
  • Due to the rapid growth of mobile devices and applications, mobile cloud computing is becoming an important platform in the development of cloud services. However, the mobile cloud computing is facing many challenges in terms of the computing resources and communications. One of them is the performance issue between mobile devices and cloud server. In the paper, we implemented a hadoop-based android mobile application, called mobile TPC-C, and used it for evaluating the performance aspect between mobile devices and cloud server. The mobile TPC-C was implemented based on the existing TPC-C, to make it possible to execute on top of android mobile devices. The performance measurement using mobile TPC-C was executed on various transactions while changing the number of mobile clients. By comparing it to the evaluation on the personal PC, we tried to point out the important aspects affecting the performance improvement between mobile clients and cloud server.

Comparison Study of Web Application Development Environments in Smartphone (스마트폰 상에서의 웹 응용프로그램 개발 환경 비교)

  • Lee, Go-Eun;Lee, Jong-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.155-163
    • /
    • 2010
  • Due to the complex registration & downloading process of the native applications, and, software and their non-standardized APIs, mobile web application is now being an alternative software for smartphones. Hybrid web application, one of the types of mobile software, because develop and has reasonable performance by using the webkit engined in smartphones. It can be easily developed by using the exiting programming skill such as HTML, JavaScript and CSS. Additionally these programming techniques can be easily used in any smartphone regardless of its platforms. Most smartphones have a webkit engine or web rending engine for high performance and smooth display in web browser. Webkit is now equipped in iPhone and Android phone. In this paper, we try to find out by comparison that the various aspects of webkit APIs of iPhone & Android phone, such as screen font size, screen orientation, touch event, gesture event and their performance. We also evaluated which one is more convenient for developers when making web programs using webkit. As a result, we found out that webkit in iPhone has more excellent performance than Android.

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

Augmented Reality Logo System Based on Android platform (안드로이드 기반 로고를 이용한 증강현실 시스템)

  • Jung, Eun-Young;Jeong, Un-Kuk;Lim, Sun-Jin;Moon, Chang-Bae;Kim, Byeong-Man
    • The KIPS Transactions:PartB
    • /
    • v.18B no.4
    • /
    • pp.181-192
    • /
    • 2011
  • A mobile phone is becoming no longer a voice communication tool due to smartphones and mobile internet. Also, it now becomes a total entertainment device on which we can play game and get services by variety applications through the Web. As smartphones are getting more popular, their usages are also increased, which makes the interest of advertising industry in mobile advertisement increased but it is bound to be limited by the size of the screen. In this paper, we suggest an augmented reality logo system based on Android platform to maximize the effect of logo advertisement. After developing software and mounting it on a real smartphone, its performances are analyzed in various ways. The results show the possibility of its application to real world but it's not enough to provide real time service because of the low performance of hardware.

A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution (안드로이드 간편결제 애플리케이션 보안 솔루션 결과값 변조를 통한 검증기능 우회 방법에 대한 연구)

  • You, Jaewook;Han, Mijeong;Kim, Kyuheon;Jang, Junyoung;Jin, Hoyong;Ji, Hanbyeol;Shin, Jeonghoon;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.827-838
    • /
    • 2018
  • Since 2014, ease of regulations on financial institutions expanded the mobile payment market based on simple authentication, and this resulted in the emergence of various simple payment services. Although several security solutions have been used to mitigate possible security threats to payment applications, there are vulnerabilities which can still be found due to the structure in which the security solution is applied to the payment service. In this paper, we analyze the payment application and security solution from the process perspective, and prove through experimentation that verification functions of security solutions can be bypassed without detailed analysis of each security function, but by simply manipulating the verification result value. Finally, we propose methods to mitigate the bypass method presented in this paper from three different perspectives, and thereby contribute to the improvement of security level of the payment service.