Abstract:
An apparatus for analyzing a permission of an application for a mobile device, the apparatus comprising: an executable file acquisition unit; a file extraction module; and an execution permission analyzing module configured to detect a security risk which can be caused by the permission on the basis of the permission described in the extracted file, wherein the information related to the permission of the application comprises: information on permission that is declared in the application, permission that the application uses and a function that uses the permission of the application.
Abstract:
The present invention provides a method of remotely controlling harmful contents including: storing connection information of a managed-terminal and connection information of a managing-terminal in a database unit by using an administrative server, by transmitting the connection information to the administrative server by using the managed-terminal; analyzing, by the managed-terminal, contents stored in the managed-terminal and creating an analysis result on the contents; requesting, by the managed-terminal, the connection information of the managing-terminal to the administrative server; transmitting, by the managed-terminal, the analysis result on the contents to the managing-terminal by using the connection information of the managing-terminal transmitted from the managing server; and processing, by the managed-terminal, the contents in accordance with a processing request for the contents transmitted from the managing-terminal.
Abstract:
An apparatus for assuring integrity of a mobile application or application software (app) includes a developer registration management unit configured to authenticate a mobile app developer based on an authentication means in response to a subscription and registration request of the mobile app developer, and an integrity verification unit configured to verify whether the mobile app has the integrity by unpackaging the mobile app uploaded to an app store server in a packaged state and determine whether to write a code signature of the app store server to the mobile app based on an integrity verification result. Thus, a secure mobile ecosystem can be constructed.