Presentation 2011/5/5
Restriction framework for Android application : Whitelitst-based installation
Keisuke Takemori, Hideaki Kawabata, Takamasa Isohara, Ayumu Kubota, Jyunichi Ikeno,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Android OS is an attractive platform for a mobile phone because anyone can develop an application and upload it to a market place. Users download and install the application in order to upgrade their Android phone. When an application is installed, the user needs to check access permissions. As it is difficult to recognize potential threats of the application by referencing the access permissions, many users infect Android phones with malware via the market place. Most security incidents of Android phones occur when users download malware via the market place. In this paper, we proposes a secure application management framework for business use of Android phones. Only the authorized application can be installed in the Android phone by comparing with a whitelist. In addition, we show a result of field trial using 1,000 Android phones. The framework is expected for an effective countermeasure to the business Android phones.
Keyword(in Japanese) (See Japanese page)
Keyword(in English)
Paper # Vol. 2011-CSEC-53 No.2,Vol. 2011-IOT-13 No.2
Date of Issue

Conference Information
Committee ICM
Conference Date 2011/5/5(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication Management(ICM)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Restriction framework for Android application : Whitelitst-based installation
Sub Title (in English)
Keyword(1)
1st Author's Name Keisuke Takemori
1st Author's Affiliation ()
2nd Author's Name Hideaki Kawabata
2nd Author's Affiliation KDDI R&D Laboratories Inc. Network security laboratory
3rd Author's Name Takamasa Isohara
3rd Author's Affiliation KDDI R&D Laboratories Inc. Network security laboratory
4th Author's Name Ayumu Kubota
4th Author's Affiliation KDDI R&D Laboratories Inc. Network security laboratory
5th Author's Name Jyunichi Ikeno
5th Author's Affiliation KDDI
Date 2011/5/5
Paper # Vol. 2011-CSEC-53 No.2,Vol. 2011-IOT-13 No.2
Volume (vol) vol.111
Number (no) 30
Page pp.pp.-
#Pages 6
Date of Issue