Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android OS ( ) Proposal of Security Evaluation Systems to Prevent the Installation of Mal-Applications on Android OS Yoshihiro Kita Shin-ichiro Kubota MiRang Park Naonobu Okazaki Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi-city, Kanagawa 243-0292, JAPAN University of Miyazaki 1-1 Gakuenkibanadai-Nishi, Miyazaki-city, Miyazaki 889-2192, JAPAN Abstract Recently, leakage of the personal information in Android OS powered device by malapplications is becoming big issue. The user approves the installation of an application, and gets permissions to use by an application. However, the lack of recognition to risk of mal-application by the users which are indifferent to the permissions. In this paper, we propose the security evaluation systems to prevent the installation of mal-application on Android OS. The system is integrated two systems, review evaluation by users, and risk indication by the combination of the permissions. 1 ( ) 1 ( - 208 -
) Android OS ( Android ) Google Play[1] Google 2012 2 Google Play Bouncer Bouncer [2] [3, 4] [5] [6, 7] [8] 3 [9] 2 2.1 Google Play[1] Android 2.2 [3, 4] - 209 -
Android Android [6, 7] Android 2.3 [5] 2.4 [8] マーケット Android 端末 アプリ アプリ 1. レビュー提出 AM 7. ダウンロードのリクエスト渡し 2. アプリのリクエスト アプリケーションユーザ レビューデータベース アプリ 4. レビューの提示 8. ダウンロード 3. アプリ情報の送信 Android 端末 6. ダウンロードのリクエスト マルウェアデータベース AM 5. パーミッションの提示 新規ユーザ 1: 3 3.1 [9] - 210 -
1 Google Play Android 3 Positive, Negative (AM) (Application Manager: AM) Android AM 3.2 1 1. AM ( 1) 2. AM ( 2) 3. ( 3) 4. 5. AM ( 4) 6. 4 AM ( 5) 7. AM ( 6) 8. - 211 -
( 7) 2: 9. AM ( 8) 3.3 READ CONTACTS WRITE CONTACTS READ CALEMDAR WRITE CALENDAR READ LOGS BIND APPWIDGET READ PROFILE WRITE PROFILE INTERNET SEND SMS BLUETOOTH NFC USE SIP CHANGE NETWORK STATE BLUETOOTH ADMIN READ CON- TACTS INTERNET normal, dangerous, signature, signatureorsystem 4 [10] normal 1 3 1 Safety, 2 Caution, 3 Danger 2 normal Danger 2: AM 3.4 AM AM 2 3 4 Positive Negative 2 Positive Negative - 212 -
1: () Safety Caution Danger / / 3: AM 4: AM Positive Negative Positive Score(P Score) Negative Score(NScore) S pos, S neg R pos, R neg, G pos, G neg B pos, B neg R pos S pos = {(1 + α)g pos (1 α)b pos }, k=0 R neg S neg = {(1 + α)g neg (1 α)b neg }, P Score = k=0 S pos S pos + S neg, NScore = S neg S pos + S neg α 0 α < 1 α α - 213 -
AM 3 4.2 5: 5 1 Safety 2 Caution 3 Danger 4 4.1 3 2 1 2,, - 214 -
3: Google Play[1] [8] 5 3 [1] Google: Google play, https://play.google.com/store [2] IPA - Android,, 2012. ADMS, 2011(CSS2011), pp.774-778, 2011. [4],,,,,, : Android OS,, Vol.2012- IOT-17, No.18, pp.1-6, 2012. [5],, : Web,, Vol.66, No.11, pp.23-26, 2011. [6],,, : Android, 2011(SCIS2011), 3B3-2, pp.1-7, 2011. [7],, : Android, 2012, C-3-1, pp.1-8, 2012. [8],,, : Android OS,, Vol.2012-CSEC-56, No.12, pp.1-7, 2012. [9],,, : Android, (DICOMO2013), pp.1-7, 2013. [10] Andre Egners, Ulrike Meyer, and Bjorn Marschollek: Messing with Android s Permission Model, Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.505-514, 2012. [3],,,,,, : Android - 215 -