A Study on the Efficient Management of Android Apps Using a WhitelistThis research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Convergence- ITRC (Convergence Information Technology Research Center) support program (NIPA-2013-H0401-13-1004) supervised by the NIPA.

被引:0
作者
Jang, Uijin [2 ]
Suh, Changjin [1 ]
Lim, Hyungmin [1 ]
机构
[1] Soongsil Univ, Sch Comp Sci & Engn, Seoul, South Korea
[2] Soongsil Univ, Dept Comp Engn, Korea Copyright Commiss, Seoul, South Korea
来源
FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS | 2014年 / 301卷
关键词
Proxy signature scheme; ID-based partially blind signature; Proxy partially blind signature; Gap Diffie-Hellman problem; Bilinear-pairing;
D O I
10.1007/978-94-017-8798-7_58
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, many people use the smart phone throughout the world, and the government and enterprise also use it to improve business efficiency. However, there is a risk that the confidential information of the government or enterprise can be disclosed, if the malicious or forged/altered App is installed and executed in the smart phone used for work. Apps distributed by the domestic App Store are verified in advance, using the independent verification system of each App Store. However, those App Stores don't use the common verification system, and their verification system is lacking security features. Besides, the Android Apps can be installed and used, using the alternative method (Android black market and APK file), instead of the official App Store. As a result, the use of the non-verified App is rarely controlled. To prevent the alternative method, mobile device management (MDM) and other methods are employed but are not quite effective. To supplement these shortcomings, this paper proposes a method of providing a reliable smart phone environment to users, by verifying the safety of the App using the common verification method for Android phones, and managing the verified App with a whitelist technology, and testing the installed App periodically.
引用
收藏
页码:473 / 482
页数:10
相关论文
共 9 条
[1]  
AhnLab, 2011, AHNLAB V3 MOB TRANS, P5
[2]  
Cheon W, 2012, J KOREAN I INF TECHN, V22, P537
[3]  
Kang H, 2012, MOBILE BROADBAND MOB
[4]  
Krishnan P, 2011, APPL ASSURANCE TECHN
[5]  
Lee K, 2010, STUDY ARCHITECTURE M
[6]  
McAfee, 2013, MCAFEE THREAT REP 4
[7]  
Ongtang M., 2009, Semantically Rich Application-Centric Security in Android
[8]  
Reddy N, 2011, FOSTER APPL CENTRIC
[9]  
Tatli EI, 2005, SECURITY CHALLENGES