Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20920
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor蕭旭君(Hsu-Chun Hsiao)
dc.contributor.authorPeng Loen
dc.contributor.author羅芃zh_TW
dc.date.accessioned2021-06-08T03:10:21Z-
dc.date.copyright2020-09-16
dc.date.issued2020
dc.date.submitted2020-08-23
dc.identifier.citation[1] J. Chen, H. Chen, E. Bauman, Z. Lin, B. Zang, and H. Guan. You Shouldn’t Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. In 24th USENIX Security Symposium (USENIX Security 15), pages 657–690, 2015.
[2] J. Cho, G. Cho, and H. Kim. Keyboard or keylogger?: A security analysis of third­ party keyboards on Android. In 2015 13th Annual Conference on Privacy, Security and Trust (PST), pages 173–176. IEEE, 2015.
[3] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.­G. Chun, L. P. Cox, J. Jung, P. Mc­ Daniel, and A. N. Sheth. Taintdroid: an information­flow tracking system for real­ time privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):1–29, 2014.
[4] F. Mohsen, E. Bello­Ogunu, and M. Shehab. Investigating the keylogging threat in android—User perspective (Regular research paper). In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ), pages 1–5. IEEE, 2016.
[5] F. Mohsen and M. Shehab. Android keylogging threat. In 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Workshar­ ing, pages 545–552. IEEE, 2013.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20920-
dc.description.abstract在安卓系統(Android)的手機中,用戶必須透過虛擬鍵盤來輸入文字。安卓系統的虛擬鍵盤不只有手機內建的預設鍵盤,使用者也能自行安裝第三方鍵盤,但這些第三方鍵盤可能帶來隱私洩露的風險。雖然現在已經有非常多的自動化測試工具能夠測試安卓系統的應用程式,例如 monkey runner 等等,但是因為虛擬鍵盤的應用程式介面(API)或是使用者介面都與一般的安卓應用程式不同,所以目前並沒有任何自動化工具能夠針對虛擬鍵盤做測試與分析。在本篇論文中,我們提出了 IMEAnalyzer 這個系統。本系統是第一個針對安卓虛擬鍵盤的自動化分析系統,它可以幫助我們快速地過濾出相對可疑的虛擬鍵盤。為了衡量 IMEAnalyzer,我們對台灣 Google Play Store 上的 112 個虛擬鍵盤做了自動化的測試與分析,最後成功篩選出 7.14% 的可疑虛擬鍵盤。zh_TW
dc.description.abstractThird-party keyboards, namely input method editors (IMEs), are indispensable in the Android system for users to enter their sensitive information. To detect whether an IME stealthily collect those information or not, it is important to have a automated testing system to analyze IMEs efficiently. However, although there exist a lot of tools for Android app automated testing, for instance the monkey runner, none of them are applicable for testing IME services. The reason is that the components of IME service, such as the APIs and user interface, are different from the other Android application. Those tools simulate user tapping behavior by sending the keycode directly to EditText of application, and thus the IME service cannot receive the tapping events. As a result, in order to solve the problem and efficiently analyze privacy leakage issues in IMEs, we present IMEAnalyzer, the first automated IME testing system. IMEAnalyzer reconstructs IME layouts in advance and sends screen tapping commands to trigger keycode events for IMEs. Additionally, IMEAnalyzer supports three different user typing behavior models to mimic different user behaviors, and record all network traffic. By using IMEAnalyzer to speed up our analysis process, we study in the 112 most downloaded IMEs in Google Play Store and filter out 92.86% non suspicious IMEs.en
dc.description.provenanceMade available in DSpace on 2021-06-08T03:10:21Z (GMT). No. of bitstreams: 1
U0001-1808202020305800.pdf: 3412419 bytes, checksum: da0427d206eaf3a9df78fa2b480df51f (MD5)
Previous issue date: 2020
en
dc.description.tableofcontents口試委員會審定書 i
誌謝 ii
Acknowledgements iii
摘要 vi
Abstract v
1 Introduction 1
2 Background 4
2.1 Android Input Method Editor........................ 4
2.2 How Android IME works.......................... 5
2.3 Android Permissions ............................ 5
3 Related Work 7
4 Problem Definition 9
4.1 Threat Model ................................ 9
5 Proposed Solution 11
5.1 IMEAnalyzer Overview........................... 11
5.1.1 A running example......................... 12
5.2 Challenge.................................. 12
5.3 User Typing Emulation........................... 12
5.4 Keyboard Layout Reconstruction...................... 13
5.5 Lightweight Traffic­-based Filter ...................... 15
5.5.1 Sending all user input........................ 15
5.5.2 Sending sensitive data only..................... 16
6 System Architecture and Implementation 18
6.1 System Architecture............................. 18
6.1.1 Package Crawler .......................... 18
6.1.2 IMEAnalyzer Server ........................ 18
6.1.3 IMEAnalyzer Application ..................... 20
6.2 Test Flow .................................. 21
6.2.1 Environment Setup......................... 21
6.2.2 Testing Process........................... 22
6.2.3 Analysis .............................. 22
7 Evaluation 23
7.1 Experiments Settings ............................ 23
7.2 Security Evaluation............................. 24
7.2.1 Classification............................ 24
7.2.2 Result................................ 25
8 Discussion 28
9 Future Work 29
9.1 Support Multiple Language systems................ 29
9.2 Record UDP Network Traffic ................... 29
9.3 System Log Analysis........................ 29
9.4 DetectAttack:StoreandSendLater .................... 30
10 Conclusion 31
Bibliography 32
dc.language.isoen
dc.subject鍵盤側錄zh_TW
dc.subject手機安全zh_TW
dc.subject安卓zh_TW
dc.subjectkeyloggingen
dc.subjectmobile securityen
dc.subjectAndroiden
dc.titleAndroid 鍵盤的隱私洩露分析zh_TW
dc.titleAndroid IME Privacy Leakage Analyzeren
dc.typeThesis
dc.date.schoolyear108-2
dc.description.degree碩士
dc.contributor.oralexamcommittee鄭欣明(Shin-Ming Cheng),林忠緯(Chung-Wei Lin),黃俊穎(Chun-Ying Huang)
dc.subject.keyword安卓,手機安全,鍵盤側錄,zh_TW
dc.subject.keywordAndroid,mobile security,keylogging,en
dc.relation.page32
dc.identifier.doi10.6342/NTU202004027
dc.rights.note未授權
dc.date.accepted2020-08-24
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
U0001-1808202020305800.pdf
  未授權公開取用
3.33 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved