Presentation | 2011/5/5 Restriction framework for Android application : Whitelitst-based installation Keisuke Takemori, Hideaki Kawabata, Takamasa Isohara, Ayumu Kubota, Jyunichi Ikeno, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Android OS is an attractive platform for a mobile phone because anyone can develop an application and upload it to a market place. Users download and install the application in order to upgrade their Android phone. When an application is installed, the user needs to check access permissions. As it is difficult to recognize potential threats of the application by referencing the access permissions, many users infect Android phones with malware via the market place. Most security incidents of Android phones occur when users download malware via the market place. In this paper, we proposes a secure application management framework for business use of Android phones. Only the authorized application can be installed in the Android phone by comparing with a whitelist. In addition, we show a result of field trial using 1,000 Android phones. The framework is expected for an effective countermeasure to the business Android phones. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | Vol. 2011-CSEC-53 No.2,Vol. 2011-IOT-13 No.2 |
Date of Issue |
Conference Information | |
Committee | ICM |
---|---|
Conference Date | 2011/5/5(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication Management(ICM) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Restriction framework for Android application : Whitelitst-based installation |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | Keisuke Takemori |
1st Author's Affiliation | () |
2nd Author's Name | Hideaki Kawabata |
2nd Author's Affiliation | KDDI R&D Laboratories Inc. Network security laboratory |
3rd Author's Name | Takamasa Isohara |
3rd Author's Affiliation | KDDI R&D Laboratories Inc. Network security laboratory |
4th Author's Name | Ayumu Kubota |
4th Author's Affiliation | KDDI R&D Laboratories Inc. Network security laboratory |
5th Author's Name | Jyunichi Ikeno |
5th Author's Affiliation | KDDI |
Date | 2011/5/5 |
Paper # | Vol. 2011-CSEC-53 No.2,Vol. 2011-IOT-13 No.2 |
Volume (vol) | vol.111 |
Number (no) | 30 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |