An approach of program analysis prevention for information protection

Ken'ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.

Original languageEnglish
Title of host publicationProceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Pages35-40
Number of pages6
DOIs
Publication statusPublished - Dec 31 2007
Externally publishedYes
Event2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 - Seoul, Korea, Republic of
Duration: Apr 26 2007Apr 28 2007

Publication series

NameProceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007

Other

Other2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
CountryKorea, Republic of
CitySeoul
Period4/26/074/28/07

Fingerprint

Ubiquitous computing

All Science Journal Classification (ASJC) codes

  • Software
  • Media Technology

Cite this

Takahashi, K., Liu, Z., & Sakurai, K. (2007). An approach of program analysis prevention for information protection. In Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 (pp. 35-40). [4197246] (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007). https://doi.org/10.1109/MUE.2007.64

An approach of program analysis prevention for information protection. / Takahashi, Ken'ichi; Liu, Zhaoyu; Sakurai, Kouichi.

Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. p. 35-40 4197246 (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Takahashi, K, Liu, Z & Sakurai, K 2007, An approach of program analysis prevention for information protection. in Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007., 4197246, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, pp. 35-40, 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, Republic of, 4/26/07. https://doi.org/10.1109/MUE.2007.64
Takahashi K, Liu Z, Sakurai K. An approach of program analysis prevention for information protection. In Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. p. 35-40. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007). https://doi.org/10.1109/MUE.2007.64
Takahashi, Ken'ichi ; Liu, Zhaoyu ; Sakurai, Kouichi. / An approach of program analysis prevention for information protection. Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. 2007. pp. 35-40 (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).
@inproceedings{fd772890c4d64cc6b0de77a5561ea873,
title = "An approach of program analysis prevention for information protection",
abstract = "The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.",
author = "Ken'ichi Takahashi and Zhaoyu Liu and Kouichi Sakurai",
year = "2007",
month = "12",
day = "31",
doi = "10.1109/MUE.2007.64",
language = "English",
isbn = "0769527779",
series = "Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007",
pages = "35--40",
booktitle = "Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007",

}

TY - GEN

T1 - An approach of program analysis prevention for information protection

AU - Takahashi, Ken'ichi

AU - Liu, Zhaoyu

AU - Sakurai, Kouichi

PY - 2007/12/31

Y1 - 2007/12/31

N2 - The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.

AB - The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.

UR - http://www.scopus.com/inward/record.url?scp=37349071348&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37349071348&partnerID=8YFLogxK

U2 - 10.1109/MUE.2007.64

DO - 10.1109/MUE.2007.64

M3 - Conference contribution

SN - 0769527779

SN - 9780769527772

T3 - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007

SP - 35

EP - 40

BT - Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007

ER -