Rooting Attack Detection Method on the Androidbased Smart Phone
Recently, the number of Internet banking transactions and e-financial services based on the public authentication certificate of smart-phones has rapidly increased. When using e-financial services by using the Android OS-based smart-phones, it is possible to experience the kind of problem related to the easy exposure of the users personal information saved within a device together with the authentication certificate due to the securityrelated vulnerability in terms of the rooting attack against the android-based mobile device. As a result, throughout this thesis, the structure of e-financial transaction services based on smart-phones and the one of the authentication certificate saved within smart-phones were analyzed. Also, following the rooting attack, the exposure-related vulnerability regarding the information related to e-financial transactions, including the authentication-related files, was analyzed. Based on the results of the analysis, a method of establishing a safe environment for e-financial ser vices was suggested.
Android Rooting Attack Countermeasure Technique, Exploit Attack for Smart work Device Introduction (Heading 1)
Won-Jun Jang Sik-Whan Cho Hyung-Woo Lee Hong-ill Ju Jeong-Nyeo Kim
School of Computer Engineering, Hanshin University, Osan, Korea Knowledge-based Information Security & Software Research Laboratory, ETRI Daejeon, Korea
国际会议
哈尔滨
英文
477-481
2011-12-24(万方平台首次上网日期,不代表论文的发表时间)