5,959 research outputs found

    Sistem Deteksi Nomor Telepon dan Rekening Bank Terindikasi Penipuan Berbasis Aplikasi Android dan Web

    Get PDF
    Hampir setiap pengguna ponsel pernah menerima panggilan atau pesan masuk dari nomor telepon yang tidak dikenal. Terkadang, panggilan atau pesan masuk demikian adalah penipuan untuk menjebak pengguna ponsel melakukan transfer uang ke rekening bank. Pengguna ponsel rentan menjadi sasaran tindakan kriminal karena sulit mendeteksi nomor telepon dan rekening bank yang dipakai untuk penipuan. Penelitian ini dimaksudkan untuk menghasilkan solusi aplikasi Android agar pengguna dapat berbagi laporan penipuan, menelusuri riwayat laporan nomor telepon dan rekening bank tertentu yang terindikasi dipakai untuk penipuan, serta mendeteksi dan memblokir panggilan masuk yang berisiko dengan tetap menghargai privasi pengguna. Aplikasi Android didukung dengan situs web khusus untuk mengelola informasi yang dibutuhkan. Keseluruhan sistem dikembangkan melalui proses berulang dan bertahap dengan metode Rapid Application Development (RAD) dan beberapa alat pengembangan yaitu: MariaDB, Kotlin, Android Studio, dan Laravel 7. Aplikasi Android dan situs web yang dihasilkan masing-masing telah melewati 37 dan 17 kasus uji dalam pengujian blackbox sehingga telah layak dipakai untuk meningkatkan kenyamanan pengguna dalam menggunakan ponsel karena mampu mendeteksi nomor telepon dan rekening bank yang terindikasi penipuan.Almost every cellphone user has received incoming calls or messages from unknown phone numbers. Sometimes, these are scam calls or messages to trap cellphone users doing money transfers to bank accounts. Mobile phone users are vulnerable to this criminal act because they are hard to detect the phone numbers and bank accounts used for scams. This research aims to produce an Android app solution so that users can share scam reports, browse the report history of specific phone numbers and bank accounts used for scams, and detect and block risky incoming calls while respecting user privacy. The Android app is supported with a dedicated website to manage the required information. The entire system was developed through an iterative and gradual process using the Rapid Application Development (RAD) method and several development tools: MariaDB, Kotlin, Android Studio, and Laravel 7. The Android application and website have passed 37 and 17 test cases in black box testing. Systems have been suitable for increasing user convenience in using a mobile phone because they can detect scam-indicated phone numbers and bank accounts

    How Smart is your Android Smartphone?

    Get PDF
    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security

    InternalBlue - Bluetooth Binary Patching and Experimentation Framework

    Full text link
    Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol optimizations imperative. Surprisingly, there is a lack of openly available tools and experimental platforms to scrutinize Bluetooth. In particular, system aspects and close to hardware protocol layers are mostly uncovered. We reverse engineer multiple Broadcom Bluetooth chipsets that are widespread in off-the-shelf devices. Thus, we offer deep insights into the internal architecture of a popular commercial family of Bluetooth controllers used in smartphones, wearables, and IoT platforms. Reverse engineered functions can then be altered with our InternalBlue Python framework---outperforming evaluation kits, which are limited to documented and vendor-defined functions. The modified Bluetooth stack remains fully functional and high-performance. Hence, it provides a portable low-cost research platform. InternalBlue is a versatile framework and we demonstrate its abilities by implementing tests and demos for known Bluetooth vulnerabilities. Moreover, we discover a novel critical security issue affecting a large selection of Broadcom chipsets that allows executing code within the attacked Bluetooth firmware. We further show how to use our framework to fix bugs in chipsets out of vendor support and how to add new security features to Bluetooth firmware

    Typical Phone Use Habits: Intense Use Does Not Predict Negative Well-Being

    Full text link
    Not all smartphone owners use their device in the same way. In this work, we uncover broad, latent patterns of mobile phone use behavior. We conducted a study where, via a dedicated logging app, we collected daily mobile phone activity data from a sample of 340 participants for a period of four weeks. Through an unsupervised learning approach and a methodologically rigorous analysis, we reveal five generic phone use profiles which describe at least 10% of the participants each: limited use, business use, power use, and personality- & externally induced problematic use. We provide evidence that intense mobile phone use alone does not predict negative well-being. Instead, our approach automatically revealed two groups with tendencies for lower well-being, which are characterized by nightly phone use sessions.Comment: 10 pages, 6 figures, conference pape
    • …
    corecore