透過您的圖書館登入
IP:18.191.189.85

摘要


近來,Android系統上的行動應用服務逐漸普及在人們的日常生活之中,然而,在這些行動服務帶來便利性的同時,越來越多的個人敏感性資料皆被有意且無意地儲存在Android系統之中,如此將使得駭客有較高的機會來拼湊出個人(或組織)的隱私。鑑於此,本研究將針對Android系統上的隱私管理進行探討與研究,文中主要提出了一套適用於Android系統上的應用程式隱私分析框架,稱為AppLeak,用以對Android應用程式進行資訊損失評估、隱私洩漏檢測和隱私風險評估。於實作面,AppLeak系統採用使用者感知和客觀攻擊意識等新興觀點,用以針對Android系統上的Facebook與LINE兩套行動軟體進行隱私分析,作為本研究框架之可行性測試。

參考文獻


Bi, C.(2009).Research and Application of SQLite Embedded Database Technology.WSEAS Transactions on Computers.8(1),539-543.
Biswas, D.,Aad, I.,Perrucci, G. P.(2013).Privacy Panel: Usable and Quantifiable Mobile Privacy.Proc. of the 8th International Conference on Availability, Reliability and Security.(Proc. of the 8th International Conference on Availability, Reliability and Security).
Chen, D.,Han, X.,Wang, W.(2010).Use of SQLite on Embedded System.Proc. of the 2010 International Conference on Intelligent Computing and Cognitive Informatics.(Proc. of the 2010 International Conference on Intelligent Computing and Cognitive Informatics).
Enck, W.,Gilbert, P.,Chun, B. G.,Cox, L. P.,Jung, J.,McDaniel, P.,Sheth, A. N.(2010).TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.Proc. of the 9th USENIX conference on Operating systems design and implementation.(Proc. of the 9th USENIX conference on Operating systems design and implementation).
Frank, M.,Dong, B.,Porter-Felt, A.,Song, D.(2012).Mining Permission Request Patterns from Android and Facebook Applications.Proc. of the 2012 IEEE International Conference on Data Mining.(Proc. of the 2012 IEEE International Conference on Data Mining).

延伸閱讀