簡易檢索 / 詳目顯示

研究生: 邱毓軒
Yu-Hsuan Chiu
論文名稱: 基於動態載入之Android App防複製攻擊機制
Copy Protection Mechanism Based on Dynamic Loading for Android Apps
指導教授: 吳宗成
Tzong-Chen Wu
口試委員: 查士朝
Shi-Cho Cha
蔡國裕
Kuo-Yu Tsai
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2014
畢業學年度: 102
語文別: 中文
論文頁數: 74
中文關鍵詞: 行動裝置AndroidApp保護單向雜湊函數數位簽章
外文關鍵詞: App copy protection, Android, Mobile device, Hash, Digital signature
相關次數: 點閱:387下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著資通訊技術之發展與行動裝置計算能力的改善,許多適用於行動裝置之應用的App如雨後春筍般出現,然而,現行的App保護機制無法有效保護App開發者的權益。因此本論文主要基於動態載入(dynamic loading)搭配數位版權管理(digital right management)的概念,設計App防複製攻擊機制。在我們所提出的機制中,使用者執行App時,需通過身分鑑別獲得分離程式區段,方可執行App的所有功能。本機制亦可達到匿名性 (anonymity)、不可偽造性(unforgeability)、雙向鑑別 (mutual authentication)、抵抗中間人攻擊 (against man-in-the-middle attack)及抵抗重送攻擊 (against replay attack)等安全需求。


    The number of Android mobile devices was increased. Android Apps also has grown to one million by the end of 2013. According to the Android developer’s website, it released the License Verification Library (LVL) to developers. LVL can protect developer’s Apps. But this copy protection mechanism was not secure, users still can use cracking tools and modified the Apps to pass the verification. In this paper, we propose a copy protection mechanism based on dynamic loading and digital right management to protect Android Apps. This mechanism is designed to fix the problems of pirated Apps. In addition, tampering with transmitted messages can be detected by the users and each other in our mechanism. Therefore, the proposed mechanism is more secure and efficient than other mechanism.

    中文摘要 I Abstract II 誌 謝 III 目 錄 IV 圖目錄 VI 表目錄 VIII 第一章 緒論 1 1.1研究背景與動機 2 1.2研究目的 5 1.3論文架構 7 第二章 文獻探討 8 2.1 App授權與管理機制介紹 8 2.2 App防複製攻擊機制探討 10 2.3數位版權介紹 16 2.3.1 Liu等人提出的數位版權機制 16 2.3.2 Chang等人提出的行動數位版權機制 17 2.3.3行動通訊聯盟數位版權管理 24 2.4密碼學基本理論與技術 27 第三章 本研究所提出的方法 33 3.1系統角色與架構 34 3.2 App防複製攻擊機制階段說明 42 第四章 安全與效率分析 55 4.1安全分析 56 4.2功能分析 60 4.3效率分析 63 第五章 結論與未來研究方向 65 5.1結論 65 5.2未來研究方向 66 參考文獻 67 附錄A重要名詞中英對照表 71

    [1] 洪偉程,「基於OMA DRM 2.0規範的數位版權管理架構之實現」,成功大學工程科學系未出版碩士論文,民國98年。
    [2] 粘添壽,「資訊與網路安全技術」,臺北:旗標出版股份有限公司,民國97年。
    [3] 陳映瑄,「適用於行動裝置之數位內容擁有權轉移機制」,臺灣科技大學資訊管理學系未出版碩士論文,民國102年。
    [4] 劉亭均,「二手電子書之擁有權轉移機制」,臺灣科技大學資訊管理學系未出版碩士論文,民國100年。
    [5] 賴溪松、韓亮、張真誠,「近代密碼學及其應用」,臺北:松崗資產管理股份有限公司,民國84年。
    [6] S. Bhatt, R. Sion, and B. Carbunar, “A personal mobile DRM manager for smart phones,” Computers and Security, vol. 28, no. 6, pp. 327-340, 2009.
    [7] C. C. Chang, J. H. Yang, and D. W. Wang. “An efficient and reliable e-drm scheme for mobile environments,” Expert Systems with Applications, vol. 37, no. 9, pp. 6176-6181, 2010.
    [8] C. L. Chen, “A secure and traceable e-DRM system based on mobile device,” Expert Systems with Applications, vol. 5, no. 3, pp. 878-886, 2008.
    [9] S. Choi, J. Jang and E. Jae, “Android application's copyright protection technology based on forensic mark,” ACM Research in Applied Computation Symposium, New York, USA, 2012, pp. 338-339.
    [10] C. Y. Chuang, H. S. Chang and Y. J. Hung, “An inter-store transaction mechanism to distribute mobile applications,” IEEE Globecom Workshops, Anaheim, USA, 2012, pp. 1016-1020.
    [11] C. Y. Chuang, Y. C. Wang and Y. B. Lin, “Digital right management and software protection on Android phones,” IEEE Vehicular Technology Conference, Taipei, Taiwan, 2010, pp. 1-5.
    [12] Google licensing verification library, “Application licensing,” Available at: http://developer.android.com/google/play/licensing/
    index.html, 2014.
    [13] J. Jang, J. Jung, H. Ji, J. Hong, D. Kim and S. K. Jung, “Protecting android applications with steganography based software watermarking,” 28th ACM Symposium on Applied Computing, New York, USA, 2013, pp. 106-120.
    [14] Y. S. Jeong, J. C. Moon, D. Kim, Y. U. Park, S. J. Cho and M. Park, “An anti-piracy mechanism based on class separation and dynamic loading for android applications,” ACM Research in Applied Computation Symposium, New York, USA, 2012, pp. 328-332.
    [15] H. Ji and W. Kim, “Design of a mobile inspector for detecting illegal android applications using fingerprinting,” ACM Research in Adaptive and Convergent Systems, New York, USA, 2013, pp. 363-364.
    [16] S. Kim, E. Kim and J. Choi, “A method for detecting illegally copied apk files on the network,” ACM Research in Applied Computation Symposium, New York, USA, 2012, pp. 253-256.
    [17] S. R. Kim, J. H. Kim and H. S. Kim “A hybrid design of online execution class and encryption-based copyright protection for android apps,” ACM Research in Applied Computation Symposium, New York, USA, 2012, pp. 342-343.
    [18] Q. Liu, R. Safavi-Naini and N. P. Sheppard, “Digital rights management for content distribution,” ACM Proceedings of the Australasian Information Security, Darlinghurst, Australia, vol. 21, 2003, pp. 49-58.
    [19] Y. C. Moon, J. H. Noh, A. R. Kim and S. R. Kim, “Design of copy protection system for android platform,” IJARCSSE International Conference on Information Technology, System and Management, Dubai, UAE, 2012.
    [20] Open mobile alliance, “Digital right management architecture candidate version 2.2,” 2011.
    [21] R. L. Rivest, A. Shamir and L. M. Adleman, “A method for obtaining digital signatures and public key cryptosystem,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    [22] C. Toma and C. Boja, “Survey of mobile digital rights management platforms,” Embedded and Distributed Systems, vol. 1, no. 1, pp. 32-42, 2009.
    [23] X. Wang, “Digital rights management scheme for mobile,” Journal of Communication and Computer, vol. 3, no. 5, pp. 91-93, 2006.
    [24] Z. Wang, Z. Zhang, Y. Chang and M. Xu, “An approach to mobile multimedia digital rights management based on android,” Genetic and Evolutionary Computing, vol. 238, pp. 239-246, 2014.

    QR CODE