• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document : 61 / 61

ÇѱÛÁ¦¸ñ(Korean Title) Àº´ÐÇü Vault ¾ÈƼÆ÷·»½Ä ¾Û Ž»öÀ» À§ÇÑ XML ±â¹Ý Ư¡Á¡ ÃßÃâ ¹æ¹ý·Ð ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps
ÀúÀÚ(Author) ±è´ë±Ô   ±èâ¼ö   Daegyu Kim   Changsoo Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 02 PP. 0061 ~ 0070 (2022. 04)
Çѱ۳»¿ë
(Korean Abstract)
½º¸¶Æ®Æù ¾ÛÀ» »ç¿ëÇÏ´Â ÀÏ¹Ý »ç¿ëÀÚµéÀº °³ÀÎÀÌ ¼ÒÀ¯ÇÏ°í ÀÖ´Â »çÁø, µ¿¿µ»ó µî °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇØ Vault ¾ÛÀ» ¸¹ÀÌ »ç¿ëÇÏ°í ÀÖ´Ù. ±×·¯³ª ¹üÁËÀÚµéÀº ºÒ¹ý ¿µ»óµéÀ» Àº´ÐÇϱâ À§ÇØ Vault ¾Û ±â´ÉÀ» ¾ÈƼÆ÷·»½Ä ¿ëµµ·Î ¾Ç¿ëÇÏ´Â »ç·Ê°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¾ÛµéÀº ±¸±Û Ç÷¹ÀÌ¿¡ Á¤»óÀûÀ¸·Î µî·ÏµÈ ¸Å¿ì ¸¹Àº ¾Ûµé Áß ÇϳªÀÌ´Ù. º» ¿¬±¸´Â ¹üÁËÀÚµéÀÌ ÀÌ¿ëÇÏ°í ÀÖ´Â Vault ¾ÛµéÀ» Ž»öÇϱâ À§ÇØ XML ±â¹ÝÀÇ ÇÙ½É¾î ºóµµ ºÐ¼®À» ÅëÇØ Æ¯Â¡Á¡À» ÃßÃâÇÏ´Â ¹æ¹ý·ÐÀ» Á¦¾ÈÇϸç, Ư¡Á¡ ÃßÃâÀ» À§Çؼ­´Â ÅؽºÆ®¸¶ÀÌ´× ±â¹ýÀ» Àû¿ëÇÑ´Ù. º» ¿¬±¸¿¡¼­´Â Àº´ÐÇü Vault ¾ÈƼÆ÷·»½Ä ¾Û°ú ºñÀº´ÐÇü Vault ¾Û °¢°¢ 15°³¸¦ ´ë»óÀ¸·Î ¾Û¿¡ Æ÷ÇÔµÈ strings.xml ÆÄÀÏÀ» È°¿ëÇÏ¿© XML ±¸¹®À» ºñ±³ ºÐ¼®ÇÏ¿´´Ù. Àº´ÐÇü Vault ¾ÈƼÆ÷·»½Ä ¾Û¿¡¼­´Â ºÒ¿ë¾î󸮸¦ 1Â÷, 2Â÷ °ÅµìÇÒ¼ö·Ï ´õ ¸¹Àº Àº´Ð °ü·Ã ´Ü¾î°¡ ³ôÀº ºóµµ·Î ¹ß°ßµÈ´Ù. º» ¿¬±¸´Â °øÇÐ ±â¼úÀûÀÎ °üÁ¡¿¡¼­ APK ÆÄÀÏÀ» Á¤Àû ºÐ¼®ÇÏ´Â ´ëºÎºÐÀÇ ±âÁ¸ ¹æ½Ä°ú´Â ´Ù¸£°Ô Àι®»çȸÇÐÀûÀÎ °üÁ¡¿¡¼­ Á¢±ÙÇÏ¿© ¾ÈƼÆ÷·»½Ä ¾ÛÀ» ºÐ·ùÇس»´Â Ư¡Á¡À» ã¾Æ³»¾ú´Ù´Â °Í¿¡ ÀÇÀÇ°¡ ÀÖ´Ù. °á·ÐÀûÀ¸·Î XML ±¸¹® ºÐ¼®À» ÅëÇØ ÅؽºÆ®¸¶ÀÌ´× ±â¹ýÀ» Àû¿ëÇϸé Àº´ÐÇü Vault ¾ÈƼÆ÷·»½Ä ¾ÛÀ» Ž»öÇϱâ À§ÇÑ ±âÃÊ ÀÚ·á·Î È°¿ëÇÒ ¼ö ÀÖ´Ù.
¿µ¹®³»¿ë
(English Abstract)
General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.
Å°¿öµå(Keyword) Àº´ÐÇü Vault ¾Û   ¾ÈƼÆ÷·»½Ä   XML   ÅؽºÆ®¸¶ÀÌ´×   ÇÙ½É¾î ºóµµ ºÐ¼®   Hidden Vault Application   Anti-forensics   XML   Text Mining   Keyword Frequency Analysis  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå