会议专题

Rooting Attack Detection Method on the Androidbased Smart Phone

Recently, the number of Internet banking transactions and e-financial services based on the public authentication certificate of smart-phones has rapidly increased. When using e-financial services by using the Android OS-based smart-phones, it is possible to experience the kind of problem related to the easy exposure of the users personal information saved within a device together with the authentication certificate due to the securityrelated vulnerability in terms of the rooting attack against the android-based mobile device. As a result, throughout this thesis, the structure of e-financial transaction services based on smart-phones and the one of the authentication certificate saved within smart-phones were analyzed. Also, following the rooting attack, the exposure-related vulnerability regarding the information related to e-financial transactions, including the authentication-related files, was analyzed. Based on the results of the analysis, a method of establishing a safe environment for e-financial ser vices was suggested.

Android Rooting Attack Countermeasure Technique, Exploit Attack for Smart work Device Introduction (Heading 1)

Won-Jun Jang Sik-Whan Cho Hyung-Woo Lee Hong-ill Ju Jeong-Nyeo Kim

School of Computer Engineering, Hanshin University, Osan, Korea Knowledge-based Information Security & Software Research Laboratory, ETRI Daejeon, Korea

国际会议

2011 International Conference on Computer Science and Network Technology(2011计算机科学与网络技术国际会议 ICCSNT 2011)

哈尔滨

英文

477-481

2011-12-24(万方平台首次上网日期,不代表论文的发表时间)