Computer Security Symposium October 2013 Android OS kub

Similar documents
IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

7,, i

9_18.dvi

DEIM Forum 2009 E

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

Web Basic Web SAS-2 Web SAS-2 i

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

3_39.dvi

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

ipod touch 1 2 Apple ipod touch ipod touch 3 ( ) ipod touch ( 1 ) Apple ( 2 ) Web 1),2) 3. ipod touch 1 2 ipod touch x y z i

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf


Web Web Web Web Web, i

Lite 2 45 ECHONET Lite ECHONET Lite [2], [3], [4], [5], [6], [7] IoT WoT Web [8] HEMS [9] ECHONET Lite ECHONET Lite ECHONET Lite ECHONET Lite ECHONET

IPSJ SIG Technical Report Vol.2014-CDS-10 No /5/ Intuitive appliance control method based on high-accurate indoor localization system

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Web Web ID Web 16 Web Web i

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

29 jjencode JavaScript

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

Vol. 28 No. 2 Apr Web Twitter/Facebook UI Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

IT,, i

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System


28 Horizontal angle correction using straight line detection in an equirectangular image

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Vol.11-HCI-15 No. 11//1 Xangle 5 Xangle 7. 5 Ubi-WA Finger-Mount 9 Digitrack 11 1 Fig. 1 Pointing operations with our method Xangle Xa

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

untitled

屋内ロケーション管理技術

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

1: ( 1) 3 : 1 2 4

No. 26 March 2016 IoT innovation IoT innovation 1 2 ICT Industry and IoT Innovation-Case Study of Competition and Cooperation between ICT and Automobi

5) 2. Geminoid HI-1 6) Telenoid 7) Geminoid HI-1 Geminoid HI-1 Telenoid Robot- PHONE 8) RobotPHONE 11 InterRobot 9) InterRobot InterRobot irt( ) 10) 4

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

P2P P2P peer peer P2P peer P2P peer P2P i

untitled

1 2 3 ( ) ( ) SNS SNS Facebook %[g]( %[ ]) [ ] IT LNS (Life Networking Service) LNS LNS LNS SNS SNS 3. LNS (Life Networking S


(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

25

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0


Web Web Web Web i

Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

( )

電子マネーと通信産業の戦略

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

04.™ƒ”R/’Ô”�/’Xfl©

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

2reN-A14.dvi

RTM RTM Risk terrain terrain RTM RTM 48

修士論文

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

Webサービス本格活用のための設計ポイント

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

untitled

Vol.20, No.1, 2018 Castillo [10] Yang [11] Sina Weibo 3 Castillo [10] Twitter 4 Twitter [12] Twitter ) 2 Twitter [13] 3. Twitter Twitter 3

, IT.,.,..,.. i

LMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

ユーザーガイド


untitled

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,


人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B

IPSJ SIG Technical Report Vol.2014-CE-127 No /12/7 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of



kita University

Transcription:

Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android OS ( ) Proposal of Security Evaluation Systems to Prevent the Installation of Mal-Applications on Android OS Yoshihiro Kita Shin-ichiro Kubota MiRang Park Naonobu Okazaki Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi-city, Kanagawa 243-0292, JAPAN University of Miyazaki 1-1 Gakuenkibanadai-Nishi, Miyazaki-city, Miyazaki 889-2192, JAPAN Abstract Recently, leakage of the personal information in Android OS powered device by malapplications is becoming big issue. The user approves the installation of an application, and gets permissions to use by an application. However, the lack of recognition to risk of mal-application by the users which are indifferent to the permissions. In this paper, we propose the security evaluation systems to prevent the installation of mal-application on Android OS. The system is integrated two systems, review evaluation by users, and risk indication by the combination of the permissions. 1 ( ) 1 ( - 208 -

) Android OS ( Android ) Google Play[1] Google 2012 2 Google Play Bouncer Bouncer [2] [3, 4] [5] [6, 7] [8] 3 [9] 2 2.1 Google Play[1] Android 2.2 [3, 4] - 209 -

Android Android [6, 7] Android 2.3 [5] 2.4 [8] マーケット Android 端末 アプリ アプリ 1. レビュー提出 AM 7. ダウンロードのリクエスト渡し 2. アプリのリクエスト アプリケーションユーザ レビューデータベース アプリ 4. レビューの提示 8. ダウンロード 3. アプリ情報の送信 Android 端末 6. ダウンロードのリクエスト マルウェアデータベース AM 5. パーミッションの提示 新規ユーザ 1: 3 3.1 [9] - 210 -

1 Google Play Android 3 Positive, Negative (AM) (Application Manager: AM) Android AM 3.2 1 1. AM ( 1) 2. AM ( 2) 3. ( 3) 4. 5. AM ( 4) 6. 4 AM ( 5) 7. AM ( 6) 8. - 211 -

( 7) 2: 9. AM ( 8) 3.3 READ CONTACTS WRITE CONTACTS READ CALEMDAR WRITE CALENDAR READ LOGS BIND APPWIDGET READ PROFILE WRITE PROFILE INTERNET SEND SMS BLUETOOTH NFC USE SIP CHANGE NETWORK STATE BLUETOOTH ADMIN READ CON- TACTS INTERNET normal, dangerous, signature, signatureorsystem 4 [10] normal 1 3 1 Safety, 2 Caution, 3 Danger 2 normal Danger 2: AM 3.4 AM AM 2 3 4 Positive Negative 2 Positive Negative - 212 -

1: () Safety Caution Danger / / 3: AM 4: AM Positive Negative Positive Score(P Score) Negative Score(NScore) S pos, S neg R pos, R neg, G pos, G neg B pos, B neg R pos S pos = {(1 + α)g pos (1 α)b pos }, k=0 R neg S neg = {(1 + α)g neg (1 α)b neg }, P Score = k=0 S pos S pos + S neg, NScore = S neg S pos + S neg α 0 α < 1 α α - 213 -

AM 3 4.2 5: 5 1 Safety 2 Caution 3 Danger 4 4.1 3 2 1 2,, - 214 -

3: Google Play[1] [8] 5 3 [1] Google: Google play, https://play.google.com/store [2] IPA - Android,, 2012. ADMS, 2011(CSS2011), pp.774-778, 2011. [4],,,,,, : Android OS,, Vol.2012- IOT-17, No.18, pp.1-6, 2012. [5],, : Web,, Vol.66, No.11, pp.23-26, 2011. [6],,, : Android, 2011(SCIS2011), 3B3-2, pp.1-7, 2011. [7],, : Android, 2012, C-3-1, pp.1-8, 2012. [8],,, : Android OS,, Vol.2012-CSEC-56, No.12, pp.1-7, 2012. [9],,, : Android, (DICOMO2013), pp.1-7, 2013. [10] Andre Egners, Ulrike Meyer, and Bjorn Marschollek: Messing with Android s Permission Model, Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.505-514, 2012. [3],,,,,, : Android - 215 -