{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00099580","sets":["1164:6389:7521:7522"]},"path":["7522"],"owner":"11","recid":"99580","title":["カメラを秘密裏に濫用する Android アプリの検出"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-03-20"},"_buckets":{"deposit":"6d263495-be43-4d25-80af-b56a2557bd69"},"_deposit":{"id":"99580","pid":{"type":"depid","value":"99580","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"カメラを秘密裏に濫用する Android アプリの検出","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"カメラを秘密裏に濫用する Android アプリの検出"},{"subitem_title":"Detection of Android apps that secretly abuse the camera","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2014-03-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学基幹理工学部"},{"subitem_text_value":"早稲田大学基幹理工学部"},{"subitem_text_value":"早稲田大学基幹理工学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/99580/files/IPSJ-SPT14008021.pdf"},"date":[{"dateType":"Available","dateValue":"2100-01-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT14008021.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f500bfc5-6e09-4064-a160-f3f7f1a04fd0","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Institute of Electronics, Information and Communication Engineers\nThis SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡邉, 卓弥"},{"creatorName":"森, 達哉"},{"creatorName":"酒井, 哲也"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takuya, Watanabe","creatorNameLang":"en"},{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"},{"creatorName":"Tetsuya, Sakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"オーナーの関知しないところでカメラを秘密裏に濫用し,盗撮・盗聴や情報漏洩を試みる可能性がある Android アプリを自動的に検出する方法を提案する.主要なアイディアはアプリケーションパッケージファイルを逆アセンブルしたコードの解析とアプリの詳細を自然言語で記述した description のテキスト解析を組み合わせることである.サードパーテイマーケットで収集した 10,885 のアプリケーションを対象に提案手法を適用したところ,カメラを秘密裏に濫用する可能性が高い 43 個の検体を自動的に検出した.手動による動的解析の結果,43 検体中少なくとも 28 検体はユーザに開示された正当な方法でカメラを利用していること,および 2 検体は内容と動作が不自然であり,かつユーザがカメラを利用する画面が認められないことからコードの詳細な静的解析が必要な検体であることがわかった.また 43 検体中 18 検体がマルウェアと判定されており,提案手法で抽出した記述と動作に齪酷があるアプリケーションは高い確率でマルウェアであることが示された。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose a method for detecting Android apps that may secretly abuse the camera to leak private or important information of the user. Our key idea is to combine two approaches: (1) analysis of disassembled code of application package files and (2) text analysis of natural language descriptions that are used to explain the details of apps. In our experiment using 10,855 Android apps collected from third-party markets, our method successfully extracted 43 samples that likely abuse camera secretly. We applied dynamic analysis to the 43 samples manually and revealed that at least 28 samples did have proper reasons to use camera thus were negative and two samples exhibited unnatural content and behaviour; thus we need detailed static code analysis for further investigation. We also found that of the 43 samples, 18 samples were detected as malware; hence, a large fraction of detected samples with our framework, which aims to extract apps with inconsistency between description and code, were actually malware.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2014-03-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"21","bibliographicVolumeNumber":"2014-SPT-8"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-21T11:59:43.639567+00:00","created":"2025-01-18T23:45:35.076299+00:00","links":{},"id":99580}