{"updated":"2025-01-20T02:40:10.877002+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00186251","sets":["1164:4088:9383:9384"]},"path":["9384"],"owner":"11","recid":"186251","title":["スマートデバイス向けサードパーティーアプリの危険性検証ツールの提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-02-26"},"_buckets":{"deposit":"6204443e-e867-4402-a13b-e62dd45ffb31"},"_deposit":{"id":"186251","pid":{"type":"depid","value":"186251","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"スマートデバイス向けサードパーティーアプリの危険性検証ツールの提案","author_link":["416941","416949","416944","416943","416942","416945","416948","416946","416951","416947","416952","416950"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"スマートデバイス向けサードパーティーアプリの危険性検証ツールの提案"},{"subitem_title":"Proposal of Risk Inspection Tool of Third Party Application for Smart Devices","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"認証・検証・暗号","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-02-26","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"徳島大学"},{"subitem_text_value":"徳島大学"},{"subitem_text_value":"徳島大学"},{"subitem_text_value":"徳島大学"},{"subitem_text_value":"徳島大学"},{"subitem_text_value":"徳島大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokushima University","subitem_text_language":"en"},{"subitem_text_value":"Tokushima University","subitem_text_language":"en"},{"subitem_text_value":"Tokushima University","subitem_text_language":"en"},{"subitem_text_value":"Tokushima University","subitem_text_language":"en"},{"subitem_text_value":"Tokushima University","subitem_text_language":"en"},{"subitem_text_value":"Tokushima University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/186251/files/IPSJ-IOT18040013.pdf","label":"IPSJ-IOT18040013.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT18040013.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"4ed90646-95bd-4166-8204-7fa4d39ca76c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"堀内, 拓磨"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大平, 健司"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"谷岡, 広樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐野, 雅彦"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松浦, 健二"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上田, 哲史"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takuma, Horiuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenji, Ohira","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroki, Tanioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiko, Sano","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenji, Matsuura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsushi, Ueta","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"サードパーティーアプリの体裁をとって,ファーストパーティーにおけるサービス内の情報や個人情報を取得する事例が報告されている.ファーストパーティーたる事業者においては,信頼喪失や,風評被害,経営危機に陥る可能性を低減すべく,自組織で管理している情報にアクセスするサードパーティーアプリを検証する必要性が高まっている.本研究では,ファーストパーティーたる事業者及び開発者を対象者とし,対象者が危険性を容易に検証するためのツールについて設計と実装を行なった.なお,本提案はサードパーティーアプリから対象者が想定していない外部サーバに情報が流出することを危険性とみなし,サードパーティーアプリの通信内容を用いて,正規表現によるパターンマッチングで解析を行う設計とした.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It is reported that some third party applications for smart devices abusively acquire service-internal information and personal information managed by first parties. To reduce possibility of losing trust, damaging reputation and falling into management crisis, companies as the first party demanded to verify third party applications that access information managed by themselves. In this research, we have designed and implemented a tool to easily verify the risk. The target user of this tool is companies as the first party and developers. This proposal regards information transfer by third party applications to external servers that the target user does not expect as a risk. This tool is designed to analyze network packets from third party applications by pattern matching with regular expression.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-02-26","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"13","bibliographicVolumeNumber":"2018-IOT-40"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:53:13.465461+00:00","id":186251,"links":{}}