Modeling and Enhancing Android's Permission System

نویسندگان

  • Elli Fragkaki
  • Lujo Bauer
  • Limin Jia
  • David Swasey
چکیده

Several works have recently shown that Android’s security architecture cannot prevent many undesired behaviors that compromise the integrity of applications and the privacy of their data. This paper makes two main contributions to the body of research on Android security: first, it develops a formal framework for analyzing Android-style security mechanisms; and, second, it describes the design and implementation of Sorbet, an enforcement system that enables developers to use permissions to specify secrecy and integrity policies. Our formal framework is composed of an abstract model with several specific instantiations. The model enables us to formally define some desired security properties, which we can prove hold on Sorbet but not on Android. We implement Sorbet on top of Android 2.3.7, test it on a Nexus S phone, and demonstrate its usefulness through a case study.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring decision making with Android's runtime permission dialogs using in-context surveys

A great deal of research on the management of user data on smartphones via permission systems has revealed significant levels of user discomfort, lack of understanding, and lack of attention. The majority of these studies were conducted on Android devices before runtime permission dialogs were widely deployed. In this paper we explore how users make decisions with runtime dialogs on smartphones...

متن کامل

APK Auditor: Permission-based Android malware detection system

Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the...

متن کامل

Flood hazard zones using 2d hydrodynamic modeling and remote sensing approaches

Increasing frequency and severity of flooding demands identification of flood hazard zones in Kalilangan, Bukidnon in response to the echoing need of better disaster preparedness via enhancing the understanding and awareness of the public on flood characteristics by integrating the use of two-dimensional hydrodynamic modeling and remote sensing. Flood simulation was carried out in a two-dimensi...

متن کامل

Machine learning algorithms in air quality modeling

Modern studies in the field of environment science and engineering show that deterministic models struggle to capture the relationship between the concentration of atmospheric pollutants and their emission sources. The recent advances in statistical modeling based on machine learning approaches have emerged as solution to tackle these issues. It is a fact that, input variable type largely affec...

متن کامل

Steady state behavior and maintenance planning of bleaching system in a paper plant

This paper presents the steady state behavior and maintenance planning of the bleaching system in a paper plant. The paper plant comprises of various systems including feeding, chipping, digesting, washing, bleaching, screening, stock preparation and paper making, etc. One of the most important functionaries of a paper plant, on which quality of paper depends, is the bleaching system, where rem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012