ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Rooting attack detection method on the Android-based smart phone
Cited 9 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Won-Jun Jang, Sik-Whan Cho, Hyung-Woo Lee, Hong-Ill Ju, Jeong-Nyeo Kim
Issue Date
2011-12
Citation
International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICCSNT.2011.6182000
Abstract
Recently, the number of Internet banking transactions and e-financial services based on the public authentication certificate of smart-phones has rapidly increased. When using e-financial services by using the Android OS-based smart-phones, it is possible to experience the kind of problem related to the easy exposure of the user's personal information saved within a device together with the authentication certificate due to the security-related vulnerability in terms of the rooting attack against the android-based mobile device. As a result, throughout this thesis, the structure of e-financial transaction services based on smart-phones and the one of the authentication certificate saved within smart-phones were analyzed. Also, following the rooting attack, the exposure-related vulnerability regarding the information related to e-financial transactions, including the authentication-related files, was analyzed. Based on the results of the analysis, a method of establishing a safe environment for e-financial services was suggested. © 2011 IEEE.
KSP Keywords
Android OS, Attack Detection, Banking Transactions, Detection Method, Internet banking, Mobile devices, Personal information, Smart Phone, e-Financial services, financial transactions, safe environment