人気の自動化アプリの脆弱性を特定、スパイ行為を検出する方法を提示(UW-Madison researchers expose how automation apps can spy and how to detect it)

2025-08-05 ウィスコンシン大学マディソン校 (UW-Madison)

ウィスコンシン大学マディソン校の研究は、Apple ShortcutsやIFTTTなどの自動化アプリが、ストーカー行為や端末操作に悪用され得る脆弱性を明らかにした。加害者が一時的に被害者のスマホに触れるだけで、居場所追跡、メッセージ漏洩、撮影、通信遮断などを仕込むことが可能で、通知も痕跡も残らない。研究チームは公開リポジトリから12,962件のショートカットを収集しAIで解析、1,014件に悪用の可能性を確認。実験では無音で写真盗用や通話妨害などが実行できることを実証した。従来のセキュリティ対策では検出困難なため、研究者らはAI駆動の検出ツールを開発し、ユーザー自身が端末を守れるサービス提供を予定している。

<関連情報>

親密なパートナー間暴力における自動化アプリの悪用可能性 Abusability of Automation Apps in Intimate Partner Violence

Shirley Zhang, Paul Chung, Jacob Vervelde, Nishant Korapati, Rahul Chatterjee, Kassem Fawaz
This paper is included in the Proceedings of the 34th USENIX Security Symposium. August 13–15, 2025 • Seattle, WA, USA

人気の自動化アプリの脆弱性を特定、スパイ行為を検出する方法を提示(UW-Madison researchers expose how automation apps can spy and how to detect it)

Abstract

Automation apps such as iOS Shortcuts and Android Tasker enable users to “program” new functionalities, also called recipes, on their smartphones. For example, users can create recipes to set the phone to silent mode once they arrive at their office or save a note when an email is received from a particular sender. These automation apps provide convenience and can help improve productivity. However, these automation apps can also provide new avenues for abuse, particularly in the context of intimate partner violence (IPV). This paper systematically explores the potential of automation apps to be used for surveillance and harassment in IPV scenarios. We analyze four popular automation apps — iOS Shortcuts, Samsung Modes & Routines, Tasker, and IFTTT — evaluating their capabilities to facilitate surveillance and harassment. Our study reveals that these tools can be exploited by abusers today to monitor, impersonate, overload, and control their victims. The current notification and logging mechanisms implemented in these automation apps are insufficient to warn the victim about the abuse or to help them identify the root cause and stop it. We therefore built a detection mechanism to identify potentially malicious Shortcuts recipes and tested it on 12,962 publicly available Shortcuts recipes. We found 1,014 recipes that can be used to surveil and harass others. We then discuss how users and platforms mitigate such abuse potential of automation apps.

1603情報システム・データ工学
ad
ad
Follow
ad
タイトルとURLをコピーしました