p-Index From 2018 - 2023
0.444
P-Index
This Author published in this journals
All Journal Generation Journal
Nur Widiyasono
University of Siliwangi

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Peringatan Otomatis Pada Internet of Things Sistem Deteksi Smart Motion Nizirwan Anwar; Budi Tjahjono; Masmur Tarigan; Dewanto Adhy Rosian; Nur Widiyasono; Rudi Hermawan
Generation Journal Vol 5 No 1 (2021): Generation Journal
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/gj.v5i1.15372

Abstract

The main problem in this research is the increase in cases of theft and robbery. This incident was caused by the busyness of everyone in their daily lives, so they forgot about the safety of their house. An Internet of Things (IoT) based home security system that utilizes a PIR sensor as a human motion detector and then sends a notification in the form of a notification via SMS or e-mail is one solution to overcome the problems that have been previously proposed in previous research. However, to further clarify the warning sent from the system, a home security system is needed that can attach an image to the notification. In this study, an IoT-based home security system was developed. The IoT security system being developed can automatically send a warning message by attaching an image when the PIR sensor detects human presence. The IoT system requires a Raspberry Pi as a microcontroller that is connected to the internet, a PIR sensor to detect human movement and a Pi Camera to win an image when there is an encounter with a human within the range of the PIR sensor. Experiments in this study show that the IoT system can automatically send warning messages via the Telegram application by attaching an image when the PIR sensor detects human presence in various light conditions with a distance of 0-5 meters and the speed of sending email alerts is influenced by the condition of the internet network connection and file size. images sent.
Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering Nur Widiyasono; Husni Mubarok; Agung Fatwa MF
Generation Journal Vol 6 No 2 (2022): Generation Journal
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/gj.v6i2.17749

Abstract

Android is the most widely used operating system in the world with a percentage of 74.82% in the Android operating system market share. This fact makes malicious software (malware) developers make mobile phone users with the Android operating system the main target for malware attacks. Attackers can change the application code by entering malicious code, repackaging the application, and publishing the application on the android application market. This study aims to find out how the malware that has been inserted into the android application works by using dynamic analysis and extracting the dangerous licenses used by the ahmyth malware by using reverse engineering techniques. The results of the analysis show that the ahmyth malware will run its service after the device restarts and waits for commands from the C&C server to perform certain actions on the infected device.