{"title":"基于GUI的无源代码Bada应用程序分析方法研究","authors":"Hanjae Jeong, Dongho Won","doi":"10.1109/AsiaJCIS.2012.19","DOIUrl":null,"url":null,"abstract":"Analyzing vulnerability or flaw on smart phone is important issue because it has sensitive information such as financial or private. Previous researches concern about major smart phone OSs such as Apple's iPhone and Google's Android. However, they did not concern about Samsung's bada. To improve analyzing efficiency, in this paper, we study a method to analyze application on bada using GUI without source code.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study on Method to Analyze Application on Bada Using GUI without Source Code\",\"authors\":\"Hanjae Jeong, Dongho Won\",\"doi\":\"10.1109/AsiaJCIS.2012.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Analyzing vulnerability or flaw on smart phone is important issue because it has sensitive information such as financial or private. Previous researches concern about major smart phone OSs such as Apple's iPhone and Google's Android. However, they did not concern about Samsung's bada. To improve analyzing efficiency, in this paper, we study a method to analyze application on bada using GUI without source code.\",\"PeriodicalId\":130870,\"journal\":{\"name\":\"2012 Seventh Asia Joint Conference on Information Security\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Seventh Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2012.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on Method to Analyze Application on Bada Using GUI without Source Code
Analyzing vulnerability or flaw on smart phone is important issue because it has sensitive information such as financial or private. Previous researches concern about major smart phone OSs such as Apple's iPhone and Google's Android. However, they did not concern about Samsung's bada. To improve analyzing efficiency, in this paper, we study a method to analyze application on bada using GUI without source code.