Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 이정현 | - |
dc.contributor.author | 김성룡 | - |
dc.contributor.author | 김정녀 | - |
dc.contributor.author | 김성태 | - |
dc.contributor.author | 신선우 | - |
dc.date.available | 2018-05-08T00:19:08Z | - |
dc.date.created | 2018-04-18 | - |
dc.date.issued | 2018-09 | - |
dc.identifier.issn | 0920-8542 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5690 | - |
dc.description.abstract | In the provision of on-demand personalized services in an IoT-based hyper-connected network, it is inevitable for the mobile device that centrally controls personal information to become the focal point. In this IoT environment, because mobile devices serve as a gateway for all personalized services, their protection plays a crucial role in the creation of a secure IoT environment. In the case of Android, the classic mobile platform, security is at risk from repackaging attacks because of structural weaknesses in the platform. To prevent such repackaging attacks, Android-based applications currently utilize various obfuscation techniques and insert tamper detection methods. However, it is possible to easily bypass even these measures. Thus, in this paper we propose an anti-reverse-engineering dynamic tamper detection scheme that applies image steganography to distribute and hide code in PNG image files. We design and implement this proposed scheme, and present the results of a security evaluation of an application with the scheme applied. © 2016 Springer Science+Business Media New York | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer | - |
dc.relation.isPartOf | Journal of Supercomputing | - |
dc.title | Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/s11227-016-1848-y | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Journal of Supercomputing, pp.1 - 20 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000444739000006 | - |
dc.identifier.scopusid | 2-s2.0-84982129484 | - |
dc.citation.endPage | 20 | - |
dc.citation.startPage | 1 | - |
dc.citation.title | Journal of Supercomputing | - |
dc.contributor.affiliatedAuthor | 이정현 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Android | - |
dc.subject.keywordAuthor | Repackaging attack | - |
dc.subject.keywordAuthor | Tamper detection | - |
dc.subject.keywordAuthor | Image steganography | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | THINGS | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.