{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00078015","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"78015","title":["セカンドアプリ内包型Androidマルウェアの検知"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"013d9778-f04f-4ded-8aaa-ceba643bc505"},"_deposit":{"id":"78015","pid":{"type":"depid","value":"78015","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"セカンドアプリ内包型Androidマルウェアの検知","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セカンドアプリ内包型Androidマルウェアの検知"},{"subitem_title":"Detection Technique of Android Malware with Second Application","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"コンピュータウィルス(1)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"KDDI研究所"},{"subitem_text_value":"KDDI研究所"},{"subitem_text_value":"KDDI研究所"},{"subitem_text_value":"KDDI研究所"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"},{"subitem_text_value":"静岡大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"},{"subitem_text_value":"Shizuoka University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/78015/files/IPSJCSS2011120.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011120.pdf","filesize":[{"value":"686.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"fb82b0eb-e022-456d-ad89-2e7c024eca5b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"磯原, 隆将"},{"creatorName":"川端, 秀明"},{"creatorName":"竹森, 敬祐"},{"creatorName":"窪田, 歩"},{"creatorName":"可児, 潤也"},{"creatorName":"上松, 晴信"},{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takamasa, Isohara","creatorNameLang":"en"},{"creatorName":"Hideaki, Kawabata","creatorNameLang":"en"},{"creatorName":"Keisuke, Takemori","creatorNameLang":"en"},{"creatorName":"Ayumu, Kubota","creatorNameLang":"en"},{"creatorName":"Jyunnya, Kani","creatorNameLang":"en"},{"creatorName":"Harunobu, Agematsu","creatorNameLang":"en"},{"creatorName":"Masakatsu, Nishigaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Androidアプリは,実行ファイル等をZIP形式で圧縮したファイルとして配布される.昨今,正規アプリを解凍して悪性アプリを追加し,再圧縮して作成されるマルウェアが増えている.ここで,追加される悪性アプリをセカンドアプリと呼ぶことにする.セカンドアプリを追加する際,マルウェア対策ソフトによる検知を逃れるために,ファイル名等が偽装される.そこで本研究では,解凍後のフォルダに含まれるファイルの属性に注目してセカンドアプリを検出する手法を提案する.提案手法は,本来ZIPファイルにAndroidアプリが含まれないことに注目したセカンドアプリ検出手法であり,Android特有のマルウェアに対する普遍的な検出手法としての有効性を示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Android application is distributed as a zip formatted file that contains execution and resource files. Android malware is built by injecting a malicious application into a legitimate application package. File name and/or extension of malicious application are obfuscated in order to avoid anti-malware tools. In this paper, we propose a detection technique of Android malware included another application, which focuses attributes of files within an application package. Our idea is designed on an assumption that a legitimate application does not contain another application. We implement the detection system and evaluate the detection ratio to indicate a validity of Android malware detection.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"713","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"708","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:43:51.237714+00:00","created":"2025-01-18T23:33:28.890708+00:00","links":{},"id":78015}