• Title/Summary/Keyword: mobile ad injection

Search Result 4, Processing Time 0.016 seconds

A Case Study on Mobile Advertisement Injection (모바일 광고 인젝션 사례 연구)

  • Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1049-1058
    • /
    • 2017
  • The rapid evolution of mobile technologies and proliferation of mobile devices have created a new channel for marketing by mobile advertising. As mobile advertising is a close relative to online advertising, it also has similar problems such as advertisement injections (Ad injections). Users are exposed to unwanted advertisements and redundant web traffic by injected ads can cause additional charges of mobile devices. Although mobile ad injection can cause many problems it has been merely studied. In this paper, we analyze ad injection activities by mobile applications that exploit a legitimate application (Naver mobile application). We reverse-engineered 2 mobile applications and find out characteristics of mobile ad injections. We compare mobile ad injections with online ad injections and suggest feasible mitigations.

A Data Fault Attack on the Miller Algorithm for Pairing Computation in Mobile Ad-Hoc Network Environments (이동 Ad-Hoc 네트워크 환경에서 페어링 연산의 밀러 알고리듬에 대한 데이터 오류 공격)

  • Bae, KiSeok;Sohn, GyoYong;Park, YoungHo;Moon, SangJae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.70-79
    • /
    • 2013
  • Recently, there has been introduced various types of pairing computations to implement ID based cryptosystem for mobile ad hoc network. The Miller algorithm is the most popular algorithm for the typical pairing computation such as Weil, Tate and Ate. In this paper, we analyze the feasibility of concrete data fault injection attack, which was proposed by Whelan and Scott, in terms of regardless of round positions during the execution of the Miller algorithm. As the simulation results, the proposed attack that can be employed to regardless of round positions and coordinate systems is effective and powerful.

Numerical Investigation of the Urea Melting and Heat Transfer Characteristics with Three Different Types of Coolant Heaters (냉각수 순환 방식 가열원 형상에 따른 요소수 해동 특성에 관한 수치적 연구)

  • Lee, Seung-Yeop;Kim, Man-Young;Lee, Chun-Hwan;Park, Yun-Beom
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.4
    • /
    • pp.125-132
    • /
    • 2012
  • Urea-SCR system, which converts nitrogen oxides to nitrogen and water in the presence of a reducing agent, usually AdBlue urea solution, is known as one of the powerful NOx reduction systems for mobile as well as stationary applications. For its consistent and reliable operation in mobile applications, such various problems as transient injection, ammonia slip, and freezing in cold weather have to be resolved. In this work, therefore, numerical study on three-dimensional unsteady heating problems were analyzed to understand the melting and heat transfer characteristics such as urea liquid volume fraction, temperature profiles and generated natural convection behavior in urea solution by using the commercial software Fluent 6.3. After validating by comparing numerical and experimental data with pure gallium melting phenomena, numerical experiment for urea melting is conducted with three different coolant heating models named CH1, 2, and 3, respectively. Finally, it can be found that the CH3 model, in which more coolant is concentrated on the lower part of the urea tank, has relatively better melting capability than others in terms of urea quantity of $1{\ell}$ for start-up schedule.

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.