Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 185202 dokumen yang sesuai dengan query
cover
Adly Gilang Kurnia
"Secara global, perangkat Apple terutama iOS memiliki 24.7% smartphone market share. Hal ini reputasi perangkat iOS menjadi perangkat paling aman dibandingkan Android. Hal ini seiring dengan barang bukti yang dominan dalam kasus forensik digital. Tantangan yang dihadapi oleh pemeriksa forensik pada perangkat iOS adalah bagaimana mendapatkan akses kedalam perangkat tersebut. Perangkat iOS yang terkunci memiliki dua kondisi yang berbeda, yaitu After First Unlock (AFU) dan Before First Unlock (BFU). Oleh karena itu diperlukan suatu penelitian untuk mengetahui informasi apa saja yang dapat diperoleh pada perangkat iOS yang terkunci. Penelitian ini bertujuan untuk melakukan akusisi dan analisa terhadap kondisi perangkat terkunci tersebut. Perangkat yang digunakan pada penelitian ini menggunakan iPhone 11 dengan iOS versi 17.4.1 dan menggunakan tools Cellebrite UFED Premium untuk melakukan akuisisi. Hasil akuisisi dari perangkat tersebut didapatkan informasi bahwa pada kondisi BFU jumlah data yang dapat dipulihkan sekitar 61.31% dan pada kondisi AFU sekitar 97.45% dibandingkan dengan akuisisi Full File System (FFS). Pemeriksaan nilai hash menunjukkan integritas data yang sangat baik, yaitu pada BFU 98.57% dan AFU 89.84% memiliki nilai hash yang sama terhadap akuisisi FFS. Hasil dari tahapan pengujian dan analisis dibuatkan alur instruksi kerja yang diharapkan menjadi referensi.

Globally, Apple devices, particularly iOS with a 24.7% smartphone market share, are increasingly encountered as digital forensic evidence. The rank is probably affected by iOS reputation that is the most secure mobile device. This aligns with the dominance of such devices as evidence. A key challenge for forensic examiners with iOS devices is gaining access to them. Locked iOS devices come in two distinct states: After First Unlock (AFU) and Before First Unlock (BFU). Therefore, research is needed to determine the information recoverable from locked iOS devices. This study aims to acquire and analyze data from such locked devices in both AFU and BFU states. An iPhone 11 running iOS 17.4.1 was used for the study, and Cellebrite UFED Premium was employed for data acquisition. The data acquisition process yielded 61.31% files from the BFU device and 97.45% files from the AFU device compared to Full File System (FFS) acquisition result. Hash value verification indicated excellent data integrity, with 98.57% and 89.84% of files in BFU and AFU devices, respectively, matching the hash values obtained from the FFS acquisition. A work instruction flow was made from the examination and analysis results that is expected to be a reference."
Depok: Fakultas Teknik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Abdul Hakim
"ABSTRAK
Enkripsi dan penyembunyian informasi adalah teknik yang digunakan untuk mendukung kerahasiaan dari informasi. Pada saat ini, banyak aplikasi yang menyediakan layanan enkripsi untuk keamanan informasi pada ponsel seperti kunci galeri, data, dll. Aplikasi ini juga saat ini banyak digunakan oleh pengguna ponsel. Aplikasi ini tidak diragukan lagi akan menjadi tantangan bagi forensik pemeriksa digital ketika ponsel terbukti menggunakan aplikasi kunci. Untuk menghadapi tantangan ini, diperlukan pembuktian ilmiah yang dapat mendapatkan data keamanan sehingga dapat membantu dalam proses analisis. Dalam studi ini, peneliti akan menggunakan alat forensik, XRY dan UFED serta akuisisi manual menggunakan ADB. Hasil yang diperoleh untuk mendapatkan informasi yang dibutuhkan yang terdapat di aplikasi kunci dan mengetahui tool forensik yang dapat diandalkan disesuaikan dengan kondisi yang ada. Pada penelitian ini peneliti berhasil mendapatkan informasi yang dibutuhkan yaitu berupa file image yang dibutuhkan dan informasi penting seperti file XML, basis data, berhasil dikumpulkan sebagai informasi kredensial yang bisa diproses selanjutnya dengan algoritma spesifik tertentu, serta gambaran umum perbedaan penggunaan tool forensik dalam akusisi aplikasi kunci.

ABSTRACT
Encryption is a technique used to support confidentiality from the information. At this time, many applications that provide encryption services for information security on mobile phones like lock gallery, data, etc. These applications are also currently widely used by mobile users. This application will undoubtedly be challenging for digital examiner forensics when the cell phone is evidence using the lock application. To encounter these challenges, this is necessary to prove scientific that can recover encrypted data so that it can assist in the analysis process. In this study, the researcher will use a forensic tool, namely XRY, and manual acquisition using ADB. The results obtained to know go beyond which forensic tools can be relied upon as well as to get the key that the application uses. In this researchers succeeded in getting the information needed in the form of required image files and important information such as XML files, databases, successfully collected as credential information that can be processed further with specific specific algorithms, as well as a general description of differences in the use of forensic tools in the acquisition of vault applications"
2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Ayubi Wirara
"ABSTRAK
Sejak diberlakukannya UU Nomor 11 Tahun 2008 tentang ITE, dokumen atau informasi elektronik telah menjadi alat bukti hukum yang sah di Indonesia. Hal ini membuat beberapa tindak kejahatan dipecahkan dengan menggunakan bukti berupa informasi elektronik termasuk salah satu diantaranya adalah aplikasi WhatsApp yang saat ini menjadi sarana utama dalam pertukaran pesan dan informasi di Indonesia. Data percakapan WhatsApp yang sangat banyak menjadi kendala bagi seorang analis forensik dalam melakukan analisis. Pada penelitian ini dilakukan analisis forensik terhadap aplikasi WhatsApp dengan menggunakan alur proses pada NIST 800-101 yang merupakan panduan dalam melakukan penanganan mobile forensik. Target dari penelitian ini adalah perangkat smarphone berbasis android dan iOS sehingga dapat dihasilkan sebuah dokumen profile artefak aplikasi WhatsApp dari kedua platform yang dapat membantu dalam proses analisis.

ABSTRACT
Since released UU No 11 2008 about ITE, document or information electronic have become legal evidence in Indonesia. This has caused several crimes being solved by using information electronic as evidence including one of them WhatsApp application which is currently the primary medium for exchanging messages and information in Indonesia. Data of WhatsApp conversation is very much an obstacle for a forensic analyst in conducting analysis. In this research about analysis forensic for WhatsApp application using flow process on NIST 800-101 which is a guide in handling mobile forensics. The target of this research is smartphone device base Android and iOS so that resulted a profile document of WhatsApp artifact form both platforms that can assist in the analysis process."
2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Zidan Ramadhan
"Media dua dimensi merupakan media konvensional yang marak digunakan secara umum. Namun begitu, media dua dimensi yang dalam hal ini berbentuk fisik, secara pelan mulai ditinggalkan dengan masifnya digitalisasi. Hal tersebut disayangkan karena banyak sumber ilmu dan informasi yang bisa saja hanya berada pada media dua dimensi. Untuk bisa membuat penggunaan media dua dimensi menjadi lebih menarik, teknologi augmented reality bisa menjadi jawaban. Dalam hal ini dikembangkan aplikasi iOS bernama readAR dengan penerapan teknologi visual inertial odometry menggunakan ARKit yang dapat melakukan pendeteksian gambar dan analisis visual dalam melakukan penempatan objek untuk bisa menghadirkan interaksi yang diinginkan pada teknologi augmented reality. Pada readAR dapat dihadirkan interaksi dalam bentuk objek tiga dimensi menggunakan SceneKit serta video menggunakan SpriteKit. Berdasarkan hasil analisis perhitungan, didapatkan nilai interaksi pada media koran untuk objek tiga dimensi memakan nilai senilai 1.45 lebih lama  dibandingkan video pada media koran dan 2.7 kali pada media majalah. Dari pengujian performa terhadap CPU, didapatkan kesimpulan interaksi video menggunakan CPU lebih besar dengan selisih 3% pada media koran dan 5.1% pada media majalah. Hal yang sama juga terjadi pada pengujian memory, dengan selisih 23.01 MB untuk media koran dan 21.17 MB untuk media majalah.

Two-dimensional media is a conventional medium that is widely used in general. However, two-dimensional media, which in this case is in physical form, is slowly being abandoned due to massive digitization. This is unfortunate because there are many sources of knowledge and information that can only exist in two-dimensional media. To make the use of two-dimensional media more interesting, augmented reality technology can be the answer. In this case, an iOS application called readAR was developed with the application of visual inertial odometry technology using ARKit, which can perform image detection and visual analysis to place objects and provide the desired interaction with augmented reality technology. In readAR, interactions can be presented in the form of three-dimensional objects using SceneKit and videos using SpriteKit. Based on the results of the calculation analysis, it was found that the interaction value for three-dimensional objects on newspaper media takes 1.45 times longer than videos on newspaper media and 2.7 times longer for magazine media. Testing the performance of the CPU showed that video interaction uses a larger CPU, with a difference of 3% for newspapers and 5.1% for magazines. The same trend was observed in the memory test, with a difference of 23.01 MB for newspapers and 21.17 MB for magazines."
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Alvito Ikramu Walidain
"Penelitian ini bertujuan untuk mendeteksi dan menganalisis malware pada aplikasi berbasis Android Application Package (APK) dan iOS Appstore Package (IPA) menggunakan MobSF. Penelitian ini mengadopsi metode hybrid, yang meng- gabungkan pendekatan statik dan dinamik, guna memberikan pandangan yang lebih menyeluruh tentang aspek keamanan aplikasi mobile. Pada pendekatan statik, MobSF menganalisis file aplikasi tanpa mengeksekusinya sehingga dapat mende- teksi potensi malware melalui pemeriksaan source code dan struktur file. Seba- liknya, pendekatan dinamik melibatkan eksekusi aplikasi di emulator untuk me- mantau perilaku runtime-nya, memungkinkan deteksi ancaman yang hanya muncul saat aplikasi dijalankan. Penelitian ini melibatkan pengujian terhadap berbagai je- nis aplikasi yang diunduh di luar platform resmi penyedia aplikasi, seperti Google Play Store dan AppStore, dengan fokus pada akurasi MobSF dalam mendeteksi malware. Penelitian ini menggunakan sampel file APK dan IPA dengan penya- maran yang digunakan oleh malware untuk mengelabui sistem deteksi keamanan. Hasil analisis akan dievaluasi untuk mengukur keberhasilan MobSF dalam mende- teksi dan mengidentifikasi malware. Hasil penelitian menunjukkan bahwa MobSF mendeteksi adanya 15.38% false positive pada sampel APK dan 100% false positive pada sampel IPA. Hasil ini mengindikasikan bahwa MobSF mampu mendeteksi be- berapa ancaman, tetapi juga menghasilkan sejumlah false positive yang perlu diper- hatikan. Hasil penelitian ini dapat menjadi dasar untuk pengembangan dan per- baikan tool analisis malware yang lebih efektif dalam menghadapi ancaman yang terus berkembang di ekosistem perangkat mobile.

This research aims to detect and analyze malware in Android Application Package (APK) and iOS Appstore Package (iOS Appstore Package) using MobSF. This research adopts a hybrid method, which combining static and dynamic approaches, to provide a more comprehensive view of the security aspects of mo- bile applications. In the static approach, MobSF analyzes application files without executing them so that it can de- detect potential malware through examining the source code and file structure. In contrast, the dynamic approach involves executing the application on an emulator to monitor its runtime behavior, enabling the detec- tion of threats that only emerge when the application is executed. This research involved testing different types of apps downloaded outside of official app provider platforms, such as the Google Play Store and AppStore, with a focus on MobSF’s accuracy in detecting malware. The research utilized samples of APK and IPA files with the disguises used by malware to trick security detection systems. The re- sults analysis will be evaluated to measure the success of MobSF in detecting and identifying malware. The analysis results show that MobSF detected 15.38% false positives in APK samples and 100% false positives in IPA samples. These findings indicate that while MobSF can detect some threats, it also produces a number of false positives that need to be addressed. This research is expected to provide in- sight into about MobSF’s reliability in detecting and analyzing APK- and IPA-based malware attacks, as well as providing further understanding of the advantages and disadvantages of static and dynamic approaches in security analysis. The results of this research can serve as a basis for the development and improvement of malware analysis tools that are more effective in dealing with evolving threats in the mobile device ecosystem."
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Sakamoto, Kazuki
"This book shows you how ARC works and how best to incorporate it into your applications. Grand Central Dispatch (GCD) and blocks are key to developing great apps, allowing you to control threads for maximum performance.
If for you, multithreading is an unsolved mystery and ARC is unexplored territory, then this is the book you'll need to make these concepts clear and send you on your way to becoming a master iOS and OS X developer. What are blocks? How are they used with GCD? Multithreading with GCD. Managing objects with ARC."
New York : Springer, 2012
e20425596
eBooks  Universitas Indonesia Library
cover
Grimes, Shawn
"iOS 5 recipes : a problem-solution approach is your guide to developing solutions on iPad, iPhone, and other iOS 5 devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases that will enable you to build fully functional applications quickly and efficiently. The recipes included in this book are wide in scope, and have been geared toward the professional developer. You'll find clear and concise code samples accompanying each recipe, and will be presented with cutting-edge solutions that bring forth the best that the iOS 5 SDK has to offer. The recipes include, working with Interface Builder in the latest version of Xcode, building applications that incorporate animation and multimedia, building location-aware apps, and understanding best practices for application design and development."
New York: Springer, 2012
e20425452
eBooks  Universitas Indonesia Library
cover
"If you’re an iOS app developer, chances are you’ll be using table views in your development projects. Table views are the bread and butter of iOS apps. With them, you can create everything from the simplest of lists to fully tricked-out user interfaces. Table views are also one of the most complex components found in UIKit. While using them for boring standard user interfaces is quite simple, customizing them can become really challenging.
Pro iOS Table Views takes a task-oriented focus to assist you when implementing customized table views. Although it delves deeply into the Table View API, you can always decide in which level of detail you want to dive in. It’s aimed to be a great reference and customization cookbook at the same time, useful for beginners as well as intermediate developers. Fitur, covers the entire Table View API in depth, covers customization and performance topics in depth, and task-oriented reference with multiple levels of detail."
New York: Springer, 2012
e20426566
eBooks  Universitas Indonesia Library
cover
Preston, Scott
"Learn HTML5 and JavaScript for iOS will help you build, fine-tune, and publish your app for iPhone, iPad, or iPod touch. Scott Preston will walk you through building a mobile web app from scratch using real-world examples. You'll learn about design considerations, mobile web frameworks, and HTML5 features like animation and graphics using Canvas. You'll also learn how to customize your app for a variety of platforms, and you'll explore testing and performance tips for your app. Get an overview of HTML5, JavaScript, and mobile web frameworks. Discover tips for iOS usability as well as performance. Dig into features like images, animation, and even geolocation."
New York: Springer, 2012
e20425549
eBooks  Universitas Indonesia Library
cover
Dona Ramadhan
"Pangsa pasar keuangan syariah berada pada angka 5% pada tahun 2018. Di sisi lain, lembaga keuangan digital (fintech) mengalami pertumbuhan sangat pesat hingga 650% dalam kurun waktu setahun. Fenomena ini menunjukkan bahwa masyarakat saat ini sudah mengadopsi teknologi mutakhir. Berdasarkan asumsi bahwa fintech syariah dapat menjadi alternatif meningkatkan pangsa pasar keuangan Islam, penelitian ini bertujuan untuk mengukur pengaruh persepsi manfaat yang dirasakan, risiko yang dialami, dan maqoshid syariah terhadap intensi untuk berinvestasi melalui fintech syariah dengan mengambil reponden pekerja lembaga keuangan non-digital. Dengan menggunakan analisis structural equation modeling (SEM) terhadap 391 sampel, hasil pengujian data menunjukkan persepsi manfaat berpengaruh positif namun tidak signifikan, persepsi  risiko berpengaruh positif secara signifikan, dan persepsi Maqoshid syariah berpengaruh positif secara signifikan terhadap intensi berinvestasi menggunakan jasa fintech syariah. Penelitian ini memiliki keterbatasan yaitu pada responden pekerja lembaga keuangan non digital, model bisnis fintech peer-to-peer, dan persepsi dari sisi investor (pemodal). Rekomendasi penelitian lebih lanjut yaitu segmen responden dari Generasi Y dan Z dan dari sisi pengguna dana. Untuk implikasi manajerial, perusahaan fintech syariah harus lebih memperhatikan masalah profitabilitas dan kebermanfaatan yang lebih luas.

The market share of Islamic banking in Indonesia remains approximately at 5 percent in 2018. On the other hand, Fintech peer-to-peer lending amount has rapidly increased up to 650% in a year. This phenomenon indicates people now have started to adopt novel technology. Based on the assumption Islamic Fintech could be an alternative way to boost Islamic finance, this paper aimed in measuring the influence of perceived benefit, perceived risk, and perceived maqoshid sharia toward intention to make investment through Islamic Fintech by non-digital financial institution employees. Using structural equation modeling (SEM) as analytical tools of 391 samples, this research found that perceived benefit has positive but insignificant impact, perceived risk has positive and significant impact, and perceived maqoshid sharia has positive and significant impact toward intention to invest using Islamic fintech. However, this research has limitations. Perception is measured from non digital financial institution employee and investor sight, and Islamic fintech peer-to-peer business model as the object of the study. The findings also suggest further research to measure the perception of Gen Y and Z, and from borrower sight of fintech. Managerial implications for Islamic fintech are to pay more attention on profitability and to deliver broader social contribution."
Depok: Fakultas Ekonomi dan Bisnis Universitas Indonesia, 2019
T54636
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>