このエントリーをはてなブックマークに追加
ID 62355
FullText URL
Author
Kudo, Naoki Graduate School of Natural Science and Technology, Okayama University
Yamauchi, Toshihiro Graduate School of Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Austin, Thomas H. San Jose State University
Abstract
Hybrid application frameworks such as Cordova allow mobile application (app) developers to create platformindependent apps. The code is written in JavaScript, with special APIs to access device resources in a platform-agnostic way. In this paper, we present a novel app-repackaging attack that repackages hybrid apps with malicious code; this code can exploit Cordova’s plugin interface to tamper with device resources. We further demonstrate a defense against this attack through the use of a novel runtime access control mechanism that restricts access based on the mobile user’s judgement. Our mechanism is easy to introduce to existing Cordova apps, and allows developers to produce apps that are resistant to app-repackaging attacks.
Note
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, March 27 to March 29, 2017
Published Date
2017-3
Publication Title
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)
Publisher
IEEE
Start Page
1063
End Page
1069
ISSN
1550-445X
Content Type
Conference Paper
language
日本語
OAI-PMH Set
岡山大学
Copyright Holders
© 2017 IEEE
File Version
author
DOI
Web of Science KeyUT
Related Url
isVersionOf https://doi.org/10.1109/aina.2017.61