• Title/Summary/Keyword: sandbox

Search Result 66, Processing Time 0.023 seconds

A Study of Security Checks for Android Least Privilege - focusing on mobile financial services - (모바일 앱 최소권한 사전검증에 관한 연구 - 금융, 안드로이드 운영체제 중심으로 -)

  • Cho, Byung-chul;Choi, Jin-young
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A security system in Android OS adopts sandbox and an permission model. In particular, the permission model operates the confirmation of installation time and all-or-nothing policy. Accordingly, the Android OS requires a user agreement for permission when installing an application, however there is very low level of user awareness for the permission. In this paper, the current status of permission requirement within mobile apps will be discovered, and the key inspection list with an appropriate method, when a mobile service provider autonomously inspects the violation of least privilege around financial companies, and its usefulness will be explored.

A Case Study on Sandplay Therapy for a Girl Suffering from Selective Mutism (선택적 함묵증 여아의 모래놀이치료 사례연구)

  • Sim, Hee-Og
    • Korean Journal of Child Studies
    • /
    • v.33 no.1
    • /
    • pp.41-62
    • /
    • 2012
  • This study explored the case of sandplay therapy for a 4th grade girl suffering from selective mutism. Her selective mutism apparently began following an extremely embarrassing experience in kindergarten. Her symptoms were a combination of symbiotic, reactive and passive- aggressive type behaviors. The goal of the therapy undertaken with this child was to enable her to express her repression and suppression, within a free and protective space during sandplay therapy. There were a total of 60 sessions of sandplay therapy. The client described the situations she had experienced in the first sandtray, by placing babies absent caring adults and food on the sandbox. She also placed baby fish away from their mother. In the mid-point of the sessions, she repeated her regressive behaviors by babbling like a baby and fought with snakes and monsters. In the final sessions, she showed integration and adaptation by engaging in snow play, expressing the union of opposites, placing blue and red mig and making a cross on the sand. This study showed the effectiveness of sandplay therapy since her selective mutism was lessened.

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

Improving Safety by Preparing Measures to Strengthen Safety Management for Special Hydrogen-Related Regulatory Projects (수소관련 규제특례사업 안전관리강화 방안 마련을 통한 안전성 제고)

  • Kim, Doe-Hyun;Han, Joo-Yeon;Tak, Song-Su;Joe, Hoe-Yeon
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.6
    • /
    • pp.106-110
    • /
    • 2021
  • The emergence of new hydrogen-related technologies and new businesses has expanded the need to reorganize systems in related fields such as manufacturing liquefied hydrogen (charging), and manufacturing liquefied hydrogen storage tanks and containers, and special applications continue to increase. Accordingly, we intend to establish and implement measures to strengthen safety management to share the status of designation of special hydrogen-related regulatory projects and secure minimum safety.

Development FintechEcosystem: Evidence of European Countries for Ukraine

  • Fedyshyn, Maiia;Abramova, Alla;Morozova, Liudmyla;Lavrov, Ruslan;Kovalova, Olena;Malin, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.29-38
    • /
    • 2022
  • The growth of digitalization processes around the world, covering almost all areas of human life, including the Fintech sector. In the field of financial technology, radical changes are taking place with increasing levels of automation, openness and consumer focus. In addition, in the context of the spread of coronavirus infection, quarantine and forced isolation, the role of digital technology is coming to the fore worldwide, including in Ukraine. The purpose of the article is to assess the development of Fintech ecosystem of European countries and outline the strategic parameters of domestic Fintech development. The study concluded that the investment raised for the Fintech industry increases annually and the quality and size of transactions gradually increases. Today, Fintech maintains its position as one of the most attractive markets for venture capitalists and the image of an industry with high potential, especially in the era of open banking. The most attractive markets for investors are mature markets, such as the United States, Germany and the United Kingdom, and the preferred niches for investment - the vertical of payments and lending. Trends in investment activity in terms of investing in financial technologies are studied. Moreover, investors prefer businesses that already have a significant scale or considerable potential to achieve it and become sustainable businesses.

A Study on the Planning of Minhwa Museum Utilizing the Metaverse Platform : Focusing on Zepeto Case (메타버스 플랫폼을 활용한 민화 미술관 기획 연구 -제페토 사례를 중심으로-)

  • Choi, Eunjin;Lee, Young-suk
    • Journal of Korea Game Society
    • /
    • v.21 no.6
    • /
    • pp.63-74
    • /
    • 2021
  • Metaverse fits well with the lifestyle of MZ generation who carries smart-phones at all times and value their identity. This study proposes a planning model that develops Minhwa, traditional Korean culture and arts, into art galleries on Zepeto, a metaverse platform. To this end, the characteristics of the metaverse platform, open world, sandbox, creator economy, and avatar, are analyzed and developed into a planning to open a Minhwa museum on Zepeto. While reinterpreting traditional Korean art in a modern way, it is worth researching as a metaverse planning and development model suitable for the new-tro sensibility of the MZ generation.

Effects of Furnished Cage Type on Behavior and Welfare of Laying Hens

  • Li, Xiang;Chen, Donghua;Li, Jianhong;Bao, Jun
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.29 no.6
    • /
    • pp.887-894
    • /
    • 2016
  • This study was conducted to compare the effects of layout of furniture (a perch, nest, and sandbox) in cages on behavior and welfare of hens. Two hundred and sixteen Hyline Brown laying hens were divided into five groups (treatments) with four replicates per group: small furnished cages (SFC), medium furnished cages type I (MFC-I), medium furnished cages type II (MFC-II), and medium furnished cages type III (MFC-III) and conventional cages (CC). The experiment started at 18 week of age and finished at 52 week of age. Hens' behaviors were filmed during the following periods: 8:00 to 10:00; 13:00 to 14:00; 16:00 to 17:00 on three separate days and two hens from each cage were measured for welfare parameters at 50 wk of age. The results showed that feeding and laying of all hens showed no effect by cage type (p>0.05), and the hens in the furnished cages had significantly lower standing and higher walking than CC hens (p<0.05). The birds in MFC-III had significant higher preening, scratching and feather-pecking behavior than in the other cages (p<0.05). No difference in nesting behavior was found in the hens between the furnished cages (p>0.05). The hens in MFC-I, -II, and -III showed a significant higher socializing behavior than SFC and CC (p<0.05). The lowest perching was for the hens in SFC and the highest perching found for the hens in MFC-III. Overall, the hens in CC showed poorer welfare conditions than the furnished cages, in which the feather condition score, gait score and tonic immobility duration of the hens in CC was significantly higher than SFC, MFC-I, MFC-II, and MFC-III (p<0.05). In conclusion, the furnished cage design affected both behavior and welfare states of hens. Overall, MFC-III cage design was better than SFC, MFC-I, and MFC-II cage designs.

Fourth Industrial Revolution Strategy: Japan's Case and Implications (제4차 산업혁명 대응 전략: 일본의 사례와 시사점)

  • Kim, Pang-ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.314-322
    • /
    • 2018
  • Japan has established a strategic and concrete plan to respond in advance to the forthcoming Industrial Revolution era. The Fourth Industrial Revolution Strategy in Japan is divided into two types of strategies of utilizing strength and complementing weaknesses. The former belongs to 'real data utilization' and 'new robot development', and the latter belongs to 'global issues Solution'. In particular, the Japanese government is more aggressive than any other country in introducing the Japanese version of the Regulatory Sandbox system as a social verification system for the realization of the Society 5.0, which is regarded as the cornerstone of the Fourth Industrial Revolution. This study examines the key strategies presented in the main documents relating to the Fourth Industrial Revolution, and based on this consideration, we propose a suggestion worthy of reference when Korea develops the response strategy of the Fourth Industrial Revolution.

Applicability of a Sharp-Interface Model in Simulating Saltwater Contents of a Pumping Well in Coastal Areas (모래상자 수리모형실험을 통한 경계면 모델의 관정 염도 모의실험)

  • Shi, Lei;Cui, Lei;Lee, Chan-Jong;Hong, Sung-Hoon;Park, Nam-Sik
    • The Journal of Engineering Geology
    • /
    • v.19 no.1
    • /
    • pp.9-14
    • /
    • 2009
  • In this work applicability of a sharp-interface model to well-scale problems is examined. In coastal areas one of the main concerns in groundwater development is saltwater intrusion. To determine the saltwater intrusion at a well one needs to evaluate the saltwater content from a pumping well. We conducted laboratory sand-tank experiments to determine if a sharp-interface model can simulate the saltwater content of a pumping well. Lateral saltwater intrusion experiments and freshwater lens experiments are conducted. A partially penetrating well and a fully penetrating well are used. Comparison between numerical results and observation results indicates that the sharp-interface model can determine saltwater contents reasonably well. We conclude that a sharp-interface model can be applied to well-scale groundwater flow problems in coastal areas.