Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö
Current Result Document :
4
/ 4
ÀÌÀü°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
ºí·ÏüÀÎÀ» ÀÌ¿ëÇÑ À§º¯Á¶ ¾Èµå·ÎÀÌµå ¾Ç¼º ¾Û ÆǺ°¡Ù
¿µ¹®Á¦¸ñ(English Title)
Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain
ÀúÀÚ(Author)
Ȳ¼ö¹Î
ÀÌÇü¿ì
Sumin Hwang
Hyung-Woo Lee
¿ø¹®¼ö·Ïó(Citation)
VOL 20 NO. 02 PP. 0061 ~ 0068 (2019. 04)
Çѱ۳»¿ë
(Korean Abstract)
´ëºÎºÐÀÇ ÀÎÅÍ³Ý ¼ºñ½º¸¦ ¼Õ½±°Ô ÀÌ¿ëÇÒ ¼ö ÀÖ´Ù´Â ÀåÁ¡À¸·Î ÀÎÇØ ½º¸¶Æ®Æù »ç¿ëÀÚ°¡ Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ°í ÀÖÀ¸³ª, À§Á¶¾ÛÀÌ ±ÞÁõÇÏ°í ÀÖ¾î ½º¸¶Æ®Æù ³»ºÎ¿¡ ÀúÀåµÈ °³ÀÎÁ¤º¸°¡ ¿ÜºÎ·Î À¯ÃâµÇ´Â ¹®Á¦Á¡ÀÌ ¹ß»ýÇÏ°í ÀÖ´Ù. Android ¾ÛÀº ÀÚ¹Ù ¾ð¾î·Î °³¹ßµÇ¾ú±â ¶§¹®¿¡ µðÄÄÆÄÀÏ °úÁ¤À» ¼öÇàÇÑ ÈÄ ¸®ÆÐŰ¡ Ãë¾àÁ¡À» ¿ªÀÌ¿ëÇÒ °æ¿ì ¼Õ½±°Ô À§Á¶¾ÛÀ» ¸¸µé ¼ö ÀÖ´Ù. ¹°·Ð À̸¦ ¹æÁöÇϱâ À§ÇØ ³µ¶È ±â¼úÀ» Àû¿ëÇÒ ¼ö ÀÖÀ¸³ª ´ëºÎºÐÀÇ ¸ð¹ÙÀÏ ¾Û¿¡´Â ¹ÌÀû¿ë »óÅ·Π¹èÆ÷µÇ°í ÀÖÀ¸¸ç, ¾Èµå·ÎÀÌµå ¸ð¹ÙÀÏ ¾Û¿¡ ´ëÇÑ ¸®ÆÐŰ¡ °ø°ÝÀ» ±Ùº»ÀûÀ¸·Î Â÷´ÜÇÏ´Â °ÍÀº ºÒ°¡´ÉÇÏ´Ù. ¶ÇÇÑ ½º¸¶Æ®Æù ³»¿¡ ¾ÛÀ» ¼³Ä¡ÇÏ´Â °úÁ¤¿¡¼ À§Á¶ ¿©ºÎ¸¦ ÀÚü °ËÁõÇÏ´Â ±â´ÉÀ» Á¦°øÇÏÁö ¾Ê¾Æ ½º¸¶Æ®Æù³» ÀúÀåµÈ °³ÀÎÁ¤º¸°¡ ¿ÜºÎ·Î À¯ÃâµÇ°í ÀÖ´Ù. µû¶ó¼ À̸¦ ÇØ°áÇϱâ À§ÇØ Hyperledger Fabric ºí·Ï üÀÎ ÇÁ·¹ÀÓ ¿öÅ©¸¦ »ç¿ëÇÏ¿© Á¤»ó¾Û µî·Ï °úÁ¤À» ±¸ÇöÇÏ°í À̸¦ ±â¹ÝÀ¸·Î È¿À²ÀûÀ¸·Î À§Á¶¾ÛÀ» ½Äº° ¹× ŽÁöÇÒ ¼ö ÀÖ´Â ¸ÞÄ¿´ÏÁòÀ» Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.
Å°¿öµå(Keyword)
ºí·ÏüÀÎ
ÇÏÀÌÆÛ·¹Àú Æäºê¸¯
¾Èµå·ÎÀÌµå ¸ð¹ÙÀÏ ¾Û
¾Ç¼º À§Á¶¾Û °ËÃâ
Blockchain
Hyperledger Fabric
Android Mobile App
Malicious Counterfeit App Detection
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.