Improving Android Security through Real-time Policy Enforcement

نویسندگان

  • Luke Chircop
  • Christian Colombo
  • Gordon J. Pace
چکیده

Let us consider a coffee distribution company that has employees visiting its customers to showcase new products and take orders. Such a company would need to provide its employees with portable devices containing sensitive data about their products and customers. Therefore, the company would want to limit access to such data to only authorized applications or users. It could also want to disable the android market or not allow untrusted applications from running on the mobile device. Another possible scenario could be that of having parents concerned with how their children use their mobile devices. It is well known that children love to play games, therefore a parent might want to control the amount of hours per day that they could spend playing on their mobile device. They could also want to make sure that the browsers that their children use, filter out bad websites. Parents could also want to control how many messages and phone calls their children make.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework

The Android framework utilizes a permission-based security model, which is essentially a variation of the ACL-based access control mechanism. This security model provides controlled access to various system resources. Access control systems are known to be vulnerable to anomalies in security policies, such as inconsistency. In this work, we focus on inconsistent security enforcement within the ...

متن کامل

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

We introduce Kynoid, a real-time monitoring and enforcement framework for Android. Kynoid is based on user-defined security policies which are defined for data-items. This allows users to define temporal, spatial, and destination constraints which have to hold for single items. We introduce an innovative approach to allow for the real-time tracking and enforcement of such policies. In this way,...

متن کامل

Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware

Smartphones and tablets have become an integral part of our daily life. They increasingly store and process security and privacy sensitive data which makes them attractive targets for attackers. In particular for the popular Android OS, a number of security extensions have been proposed that target specific security and privacy problems caused by Android’s lack of a fine-grained, dynamic and sy...

متن کامل

Aurasium: Practical Policy Enforcement for Android Applications

The increasing popularity of Google’s mobile platform Android makes it the prime target of the latest surge in mobile malware. Most research on enhancing the platform’s security and privacy controls requires extensive modification to the operating system, which has significant usability issues and hinders efforts for widespread adoption. We develop a novel solution called Aurasium that bypasses...

متن کامل

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices

It is becoming a global trend for company employees equipped with mobile devices to access company’s assets. Besides enterprise apps, lots of personal apps from various untrusted app stores may also be installed on those devices. To secure the business environment, policy enforcement on what, how, and when certain apps can access system resources is required by enterprise IT. However, Android, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014