日本語フィールド
著者:Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai題名:
Detection of Android API Call Using Logging Mechanism within Android Framework発表情報:Proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2013), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 巻: 127 ページ: 393-404キーワード:Android, Malware, Privacy Protection, Dynamic Analysis概要:Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of application by understanding the potential threats in the application. In this paper, we focus on acquisition of information by using a remote procedure call when we invoke the API to acquire phone ID. We design a methodology to record invocation that are concerned the API by inserting Log.v methods. We examined our method, and confirm empirically the record of the call behavior of the API to acquire phone ID.抄録:Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of application by understanding the potential threats in the application. In this paper, we focus on acquisition of information by using a remote procedure call when we invoke the API to acquire phone ID. We design a methodology to record invocation that are concerned the API by inserting Log.v methods. We examined our method, and confirm empirically the record of the call behavior of the API to acquire phone ID.英語フィールド
Author:Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi SakuraiTitle:
Detection of Android API Call Using Logging Mechanism within Android FrameworkAnnouncement information:Proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2013), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol: 127 Page: 393-404Keyword:Android, Malware, Privacy Protection, Dynamic AnalysisAn abstract:Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of application by understanding the potential threats in the application. In this paper, we focus on acquisition of information by using a remote procedure call when we invoke the API to acquire phone ID. We design a methodology to record invocation that are concerned the API by inserting Log.v methods. We examined our method, and confirm empirically the record of the call behavior of the API to acquire phone ID.An abstract:Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of application by understanding the potential threats in the application. In this paper, we focus on acquisition of information by using a remote procedure call when we invoke the API to acquire phone ID. We design a methodology to record invocation that are concerned the API by inserting Log.v methods. We examined our method, and confirm empirically the record of the call behavior of the API to acquire phone ID.