Application-centric security policies on unmodified Android

نویسندگان

  • Nikhilesh Reddy
  • Jinseong Jeon
  • Jeffrey A. Vaughan
  • Todd Millstein
  • Jeffrey S. Foster
چکیده

Google’s Android platform uses a fairly standard resource-centric permission model to protect resources such as the camera, GPS, and Internet connection. We claim that a much better permission model for developers and users would be application-centric, with a vocabulary that directly relates to application-level functionality, e.g., one permission could allow camera use, but only for barcode scanning; another could allow Internet access, but only to certain domains. Despite the large apparent gap between resourceand application-centric permissions, we argue that Android already provides the necessary mechanisms to support an expressive and practical form of application-centric policies. Specifically, each application-centric permission can be represented by a new Android permission and can be enforced by coupling the permission with a trusted service running in its own process. We present a survey of the top 24 free Android apps and show that a small vocabulary of application-centric permissions covers much of the functionality of those apps. We also describe a prototype implementation of our approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

We introduce Kynoid, a real-time monitoring and enforcement framework for Android. Kynoid is based on user-defined security policies which are defined for data-items. This allows users to define temporal, spatial, and destination constraints which have to hold for single items. We introduce an innovative approach to allow for the real-time tracking and enforcement of such policies. In this way,...

متن کامل

Android Multi-Level System Permission Management Approach

With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilities to manage application permissions without root privilege. This study proposes a dynamic management mechanism of Android application permissions based on security policies. The pa...

متن کامل

DEMO: NFCGate - An NFC Relay Application for Android

Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in close proximity to communicate with the reader. We developed NFCGate, an Android application capable of relaying NFC communication between card and reader using two rooted but otherw...

متن کامل

Boxify: Full-fledged App Sandboxing for Stock Android

We present the first concept for full-fledged app sandboxing on stock Android. Our approach is based on application virtualization and process-based privilege separation to securely encapsulate untrusted apps in an isolated environment. In contrast to all related work on stock Android, we eliminate the necessity to modify the code of monitored apps, and thereby overcome existing legal concerns ...

متن کامل

Jif-Based Verification of Information Flow Policies for Android Apps

Android stores and users need mechanisms to evaluate whether their applications are secure or not. Although various previous works use data and control flow techniques to evaluate security features of Android applications, this paper extends those works by using Jif to verify compliance of information flow policies. To do so, the authors addressed some challenges that emerge in Android environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011