Zobrazeno 1 - 10
of 105
pro vyhledávání: '"Jeong Hyun Yi"'
Publikováno v:
IEEE Access, Vol 10, Pp 75802-75815 (2022)
To dynamically identify malicious behaviors of millions of Windows malware, anti-virus vendors have widely been using sandbox-based analyzers. However, the sandbox-based analysis has a critical limitation that anti-analysis techniques (i.e., Anti-san
Externí odkaz:
https://doaj.org/article/c537fb9f49734e6db32ef264b54f7b8f
Publikováno v:
IEEE Access, Vol 10, Pp 20008-20018 (2022)
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detec
Externí odkaz:
https://doaj.org/article/c718ef95ba9f4c54a630f5c6b8f431d2
Publikováno v:
IEEE Access, Vol 9, Pp 119578-119590 (2021)
Sensitive information leakages from applications are a critical issue in the Android ecosystem. Despite the advance of techniques to secure applications such as packing and obfuscation, a lot of applications are still under the threat of repackaging
Externí odkaz:
https://doaj.org/article/6f701291e82f410f952655249c9fc920
Publikováno v:
IEEE Access, Vol 8, Pp 48503-48514 (2020)
In the forthcoming era of IoT, where everything will be connected, mobile devices will play a key role in providing data sharing and user-centric services between devices. In such a service environment, if a mobile application is vulnerable to securi
Externí odkaz:
https://doaj.org/article/ecafabbb440541baafc0ede16b9acdfd
Autor:
Joonsang Yoo, Jeong Hyun Yi
Publikováno v:
IEEE Access, Vol 6, Pp 46731-46741 (2018)
The stable and seamless connection of the mobile communication system is expected to closely link an unprecedented number of things, including smart cars such as autonomous vehicles, in the near future. These vehicles will operate based on the data t
Externí odkaz:
https://doaj.org/article/d061001a63764bdb865c38df79dd58e4
Publikováno v:
IEEE Access, Vol 6, Pp 71229-71240 (2018)
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed. These tools obfuscate sensitive strings and classes, API calls, and control flows in
Externí odkaz:
https://doaj.org/article/0a1a043bb8ac4f208338be40931e3a02
Publikováno v:
IEEE Access, Vol 5, Pp 6361-6371 (2017)
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports. Compatibility based on the same platform can provide more convenient personalization
Externí odkaz:
https://doaj.org/article/3ce115a21de149ffb58bbd87391961e4
Publikováno v:
Journal of Internet Services and Information Security, Vol 6, Iss 3, Pp 27-39 (2016)
The runtime system for the Android platform has changed to ART. ART differs from previously used Dalvik in that it is to be a runtime environment for the application’s machine code. As a result, ART does not execute Dalvik bytecode through an inter
Externí odkaz:
https://doaj.org/article/d0c34abc23804f5cbe44c224fe5400a8
Publikováno v:
Entropy, Vol 17, Iss 6, Pp 3947-3962 (2015)
To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created
Externí odkaz:
https://doaj.org/article/f034d4439845427fbe85c711b2f4555f
Publikováno v:
Sensors, Vol 19, Iss 11, p 2625 (2019)
As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical be
Externí odkaz:
https://doaj.org/article/0cf09fed30a644f29de3fb73f6ba6db0