• Title/Summary/Keyword: android application

Search Result 796, Processing Time 0.02 seconds

Development of a Meeting Android Application Based on Real-Time Remote Screen Control (실시간 원격화면 제어 기반의 회의 지원 안드로이드 앱 개발)

  • Jung, Jae Yoon;Kim, Tae-Hwa;Jung, Hyun-Woo;Lee, Ji-Hoon;Kim, Dong Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.411-413
    • /
    • 2012
  • It is noticeable that the number of newly registered Android applications increases rapidly. Such a recent trend indicates the Android platform is spreading globally. The ongoing platform upgrade might be one of the main reasons of the popularity of the Android mobile platform. Android platform 4.0 or later provides WiFi-Direct APIs that allow smart devices to communicate with each other without intermediate media. In this paper, we propose design and implementation techniques for small-scale impromptu meeting applications based on WiFi-Direct. The proposed meeting application can be used in a situation when one is difficult to connect the Internet. It also provides meeting data sharing capabilities, noting functionality, real-time remote screen control, and grouping of meeting participants. Our development results have demonstrated that the Android WiFi-Direct APIs can be effectively applied to impromptu conferencing mobile applications.

  • PDF

Development of a Portable Potentiostat with Wireless Communications for Measuring Dissolved Oxygen (용존산소 측정을 위한 무선통신 기반 휴대형 포텐쇼스탯 개발)

  • Lee, Hyun-Seok;Han, Ji-Hoon;Pak, Jungho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1641-1647
    • /
    • 2018
  • In this paper, we describe a portable potentiostat which is capable of cyclic voltammetry(CV) and amperometry for electrochemical dissolved oxygen sensor. In addition, this portable potentiostat can also transmit the measured data wirelessly to android devices such as smart phone, tablet, etc. through Bluetooth. The potentiostat system consists of three parts; a voltage generator circuit which is controlled by Arduino nano and 12-bit DAC(digital to analog converter) to generate necessary electric potential for operating the electrochemical sensor, an oxidation/reduction current measurement circuit, and a Bluetooth module to transmit data wirelessly to an android device. Once measurements are carried out with the android application, the measured data is transmitted to the android device via Bluetooth and displayed using the android app. in real time. In this paper, we report the measured reduction current with a fabricated dissolved oxygen sensor in both saturated-oxygen state and zero-oxygen states. The results of the developed portable potentiostat system are in good agreement with those of the commercial portable potentiostat (${\mu}stat200$, Dropsens inc.). The measured peak reduction currents using the developed potentiostat and the commercial ${\mu}stat200$ potentiostat were $-0.755{\mu}A$ and $-0.724{\mu}A$, respectively. The reduction currents measured at zero-oxygen state were $-0.005{\mu}A$ and $-0.004{\mu}A$. The discrepancy between those two systems seems very small, which implies successful development of a portable and wireless potentionstat.

Lifesaver: Android-based Application for Human Emergency Falling State Recognition

  • Abbas, Qaisar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.267-275
    • /
    • 2021
  • Smart application is developed in this paper by using an android-based platform to automatically determine the human emergency state (Lifesaver) by using different technology sensors of the mobile. In practice, this Lifesaver has many applications, and it can be easily combined with other applications as well to determine the emergency of humans. For example, if an old human falls due to some medical reasons, then this application is automatically determining the human state and then calls a person from this emergency contact list. Moreover, if the car accidentally crashes due to an accident, then the Lifesaver application is also helping to call a person who is on the emergency contact list to save human life. Therefore, the main objective of this project is to develop an application that can save human life. As a result, the proposed Lifesaver application is utilized to assist the person to get immediate attention in case of absence of help in four different situations. To develop the Lifesaver system, the GPS is also integrated to get the exact location of a human in case of emergency. Moreover, the emergency list of friends and authorities is also maintained to develop this application. To test and evaluate the Lifesaver system, the 50 different human data are collected with different age groups in the range of (40-70) and the performance of the Lifesaver application is also evaluated and compared with other state-of-the-art applications. On average, the Lifesaver system is achieved 95.5% detection accuracy and the value of 91.5 based on emergency index metric, which is outperformed compared to other applications in this domain.

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments (안드로이드 기반 SNS 어플리케이션의 코드 변조를 통한 취약점 분석 및 보안 기법 연구)

  • Lee, Sang Ho;Ju, Da Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.213-221
    • /
    • 2013
  • According to the rapid growth of the number of SNS(Social Networking Service) applications based on Android OS, the importance of its security is also raised. Especially, many applications using KaKaoTalk platform has been released in these days, and these are top ranked in the relative markets. However, security issues on SNS applications have not been resolved clearly. Therefore, it is crucial to provide means to cope with the security threats posed by code-segment modification in the development stage of Android OS based SNS applications. In this paper, we analyze the security threats by modifying SNS application code segments and suggest effective security techniques.

Home Network Application using Android Mobile Platform (안드로이드 모바일 플랫폼을 이용한 홈 네트워크 응용)

  • Choi, Jin-Yeop;Lee, Sang-Jeong;Jeon, Byoung-Chan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.7-15
    • /
    • 2010
  • Recently, there are many home network applications using the convergence between mobile platforms and home network system. As smart phones which are called small PC in the hand becoming popular, the development of home network application beyond the one of cellular phones is required. Android mobile platform of Google includes OS, middleware and primary applications. Also, in addition to smart phones, it can be mounted on various devices such as set-top box and household appliances. In this paper, home network services on smart phones of Android platform are designed and implemented. The services provide real-time monitoring information (temperature, humidity, real-time video) of rooms and appliance control in a house.

Linear SVM-Based Android Malware Detection and Feature Selection for Performance Improvement (선형 SVM을 사용한 안드로이드 기반의 악성코드 탐지 및 성능 향상을 위한 Feature 선정)

  • Kim, Ki-Hyun;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.738-745
    • /
    • 2014
  • Recently, mobile users continuously increase, and mobile applications also increase As mobile applications increase, the mobile users used to store sensitive and private information such as Bank information, location information, ID, password on their mobile devices. Therefore, recent malicious application targeted to mobile device instead of PC environment is increasing. In particular, since the Android is an open platform and includes security vulnerabilities, attackers prefer this environment. This paper analyzes the performance of malware detection system applying linear SVM machine learning classifier to detect Android malware application. This paper also performs feature selection in order to improve detection performance.

A Study on the Vulnerability of Using Intermediate Language in Android: Bypassing Security Check Point in Android-Based Banking Applications (안드로이드 뱅킹 어플리케이션 내 중간언어 분석을 통한 보안 검사 지점 우회 취약점 연구)

  • Lee, Woojin;Lee, Kyungho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.549-562
    • /
    • 2017
  • In recent years, as the proportion of mobile banking has become bigger with daily usage of mobile banking, security threats are also increasing according to the feeling. Accordingly, the domestic banking system introduces security solution programs in the banking application and sets security check points to ensure the stability of the application in order to check whether it is always executed. This study presents a vulnerability of inactivity bypassing mobile vaccine program operation checkpoints using the intermediate language statically and dynamically analysis when decompiling the android banking applications of major banks in Korea. Also, through the results, it identifies possible attacks that can be exploited and suggest countermeasures.

An Application Obfuscation Method Using Security Token for Encryption in Android (안드로이드 환경에서 보안 토큰을 이용한 앱 난독화 기법)

  • Shin, JinSeop;Ahn, Jaehwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1457-1465
    • /
    • 2017
  • With the growing of smart devices market, malicious behavior has gradually expanded its scope. Accordingly, many studies have been conducted to analyze malicious apps and automated analysis tools have been released. However these tools cause the side effects that the application protection tools such as ProGuard, DexGuard become vulnerable to analyzers or attackers. This paper suggests the protection mechanism to apply to the Android apps using security token, rather than general-purpose protection solutions that can be applied in malicious apps. The main features of this technique are that Android app is not properly loaded in the memory when the security token is abnormal or is not inserted and protected parts using the technique are not exposed.

A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application (패킹된 안드로이드 어플리케이션의 안전한 실행을 위한 실행 환경 무결성 검증 기법)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1553-1561
    • /
    • 2018
  • The source code for Android is open and easy to modify depending on the purpose. Recently, this charateristic has been exploited to bypass the runtime protection technique and extract the original executable code. Unfortunately, Android devices are so fragmented that it is difficult to verify the integrity of the system. To solve this problem, this paper proposes a technique to verify the integrity of the execution environment indirectly using the features of the application permission. Before executing the original executable code, it loads and executes the dummy DEX file to monitor for abnormal events and determine whether the system is intact. The proposed technique shows a performance overhead of about 2 seconds and shows that it can detect the bypassing technique that is currently disclosed.