QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android
|
|
- Hortense Reeves
- 5 years ago
- Views:
Transcription
1 QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android Tobias Markmann 1 Dennis Gessner 2 Dirk Westhoff 3 1 HAW Hamburg, Germany 2 NEC Laboratories Europe, Heidelberg, Germany 3 HFU Furtwangen, Germany IEEE ICC Communications and Informations Systems Security Symposium 1/ 14
2 Motivation Android popularity increasing Privacy under attack! Soundcomber (NDSS, 2011), PlaceRaider (NDSS, 2013), Permission model confusing & inflexible 2/ 14 Source: PlaceRaider [2]
3 Android Security & Communication System Security Common Linux security High-level permissions Sandbox for apps High-level IPC 3/ 14 Source: Programming Android [3]
4 Android Security & Communication System Security Common Linux security High-level permissions Sandbox for apps High-level IPC Communication High-level Middleware Unicast, Broadcast & RPC Poorly secured 3/ 14 Source: Programming Android [3]
5 Objective Identifying privilege escalation Detecting illegal information flow Dishonest/Colluding apps Abused apps Prevent mobile privacy invasion Using information flow analysis 4/ 14
6 Related Work XManDroid (NDSS, 2012) Graph based App permissions Direct & indirect communication 5/ 14 Source: XManDroid [4]
7 Related Work XManDroid (NDSS, 2012) Graph based App permissions Direct & indirect communication IPC Inspection (USENIX Sec., 2011) Focus on permission redelegation Adjust IPC callee permissions Only reduced, never extended Merely message independent interface-level permission control. 5/ 14 Source: XManDroid [4]
8 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection 6/ 14
9 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) 6/ 14
10 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) FlowGraphService Real-time collection Communication graph Containing all running apps Quantitative data flow 6/ 14
11 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection FlowGraphService Real-time collection Communication graph Containing all running apps Quantitative data flow Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) Limit enforcement Enforce data flow limits Based on taint tags Countermeasures Kill app Block IPC message 6/ 14
12 Utilising Dynamic Taint Tagging TaintDroid (OSDI, 2010) Dynamic taint tagging Tag = data source Dalvik VM only, no native code Across IPC 7/ 14 Source: TaintDroid [6]
13 Utilising Dynamic Taint Tagging Taint Tagged IPC TaintDroid (OSDI, 2010) Dynamic taint tagging Interpreted Code Trusted Application Taint Source (1) Untrusted Application Trusted Library (8) Taint Sink Tag = data source Dalvik VM only, no native code Across IPC Userspace (2) Dalvik VM Interpreter Binder IPC Library (3) (4) Virtual Taint Map Binder Hook (5) (6) Virtual Taint Map Binder Hook (7) (9) Dalvik VM Interpreter Binder IPC Library Kernel BinderKernel Module 7/ 14 Source: TaintDroid [6]
14 Visualisation Current graph via custom fgdump-tool Graphviz for rendering Example Snapshot UID UID Tag: IMEI Throughput: 1664 Bytes/min Tag: CONTACTS Throughput: 1664 Bytes/min Tag: CONTACTS Throughput: 3968 Bytes/min android.process.media com.example.servicecomreceiver UID com.example.servicecomsender 8/ 14
15 Evaluation Cirteria Privilege escalation sensitive data propagates across apps Works with standard Android SDK APIs Test Scenarios i) Conspiring apps ii) Confused-deputy 9/ 14
16 Scenario: Conspiring apps Setup Attack scenario: conspiring apps Start Activity Intent <<component>> WeatherEntryActivity <<component>> MappingActivity Service Call Service Reply Service Call Activity Result <<component>> WeatherWidget <<component>> WeatherReporterService Service Reply Objective Innocent looking apps siphoning off contact data to send it off-site. 10/ 14
17 Scenario: Conspiring apps Execution T 1 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14
18 Scenario: Conspiring apps Execution T 2 UID com.example.snr_a.custommapping UID bytes 1 contact Tag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14
19 Scenario: Conspiring apps Execution T 3 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID Tag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14
20 Scenario: Conspiring apps Execution T 3 to T 4 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID XTag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14
21 Scenario: Conspiring apps Execution T 4 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID com.example.snr_a.weatherreporter 11/ 14
22 Scenario: Confused-deputy Attack scenario: confused-deputy <<component>> EvilSMSBrowser Activity Service Call <<component>> SMSFormatterService Service Reply <<component>> NiceSMSBrowser Activity Service Reply Service Call Objective SMS theft due to insecure/open API. Execution See our paper. 12/ 14
23 Conclusion & Outlook Conclusion Mitigate privilege escalation Quantitative IPC monitoring Limitation: Not monitoring IP-/UNIX-sockets 13/ 14
24 Conclusion & Outlook Conclusion Mitigate privilege escalation Quantitative IPC monitoring Limitation: Not monitoring IP-/UNIX-sockets Outlook Analyse apps from Play Store Investigating data flow threshold heuristics 13/ 14
25 Questions? Tobias Markmann Department of Computer Science HAW Hamburg [1] R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in NDSS, The Internet Society, [2] R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia, PlaceRaider: Virtual Theft in Physical Spaces with Smartphones, CoRR, vol. abs/ , [3] Z. R. Mednieks et al., Programming Android: Java programming for the new generation of mobile devices. O Reilly & Associates, Inc., second ed., [4] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, Technical Report TR , Technische Universität Darmstadt, Apr [5] A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission re-delegation: attacks and defenses, in Proceedings of the 20th USENIX conference on Security, SEC 11, (Berkeley, CA, USA), pp , USENIX Association, [6] W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, in OSDI (R. H. Arpaci-Dusseau and B. Chen, eds.), pp , USENIX Association, / 14
2 Lecture Embedded System Security A.-R. Darmstadt, Android Security Extensions
2 Lecture Embedded System Security A.-R. Sadeghi, @TU Darmstadt, 2011-2014 Android Security Extensions App A Perm. P 1 App B Perm. P 2 Perm. P 3 Kirin [2009] Reference Monitor Prevents the installation
More informationSTUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES
STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES REJO MATHEW Department of Information Technology, NMIMS University, MPSTME, Mumbai, Maharashtra 400056, India rejo.mathew@nmims.edu
More informationLecture Embedded System Security
Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2011 Overview Introduction Android Software Stack Android
More information6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014
6.858 Quiz 2 Review Android Security Haogang Chen Nov 24, 2014 1 Security layers Layer Role Reference Monitor Mandatory Access Control (MAC) for RPC: enforce access control policy for shared resources
More informationAndroid Based Business Card Scanner: An OCR Based Approach
Android Based Business Card Scanner: An OCR Based Approach Prof. Kaushal Patel 1, Prof. Amit Choksi 2 Department of Electronics & Telecommunication Engineering, Birla Vishvakarma Mahavidyalaya engineering
More informationAn Effective Access Control Scheme for Preventing Permission Leak in Android
An Effective Access Control Scheme for Preventing Permission Leak in Android Longfei Wu 1, Xiaojiang Du 1, and Hongli Zhang 2 1 Department of Computer and Information Science, Temple University, Philadelphia,
More informationTowards a Systematic Study of the Covert Channel Attacks in Smartphones
Towards a Systematic Study of the Covert Channel Attacks in Smartphones Swarup Chandra 1, Zhiqiang Lin 1, Ashish Kundu 2, and Latifur Khan 1 1 University of Texas at Dallas, Richardson, TX, USA {swarup.chandra,zhiqiang.lin,lkhan}@utdallas.edu
More informationStatic Verification of Android Security
Static Verification of Android Security Michele Bugliesi based on work with Stefano Calzavara and Alvise Spanò appeared at FORTE/FMOODS Int. Conf. 2013 Università Ca Foscari Venezia Dipartimento di Scienze
More informationModeling the Android Platform
Modeling the Android Platform Étienne Payet LIM-ERIMIA, université de la Réunion BYTECODE 13 Saturday 23 March 2013 Étienne Payet (LIM-ERIMIA) Modeling the Android Platform BYTECODE 13 1 / 50 Reunion,
More informationSieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime Jianmeng Huang 2017,1,12 Outline 1 Motivation Intro Current solutions Our goals 2 SieveDroid Our solution
More informationFlexible and Fine- Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies
Flexible and Fine- Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Sven Bugiel Joint work with Stephan Heuser and Ahmad- Reza Sadeghi Cryptography and InformaAon Security
More informationLecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical
Lecture 08 Android Permissions Demystified Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner Operating Systems Practical 20 November, 2013 OSP Lecture 08, Android Permissions Demystified
More informationScippa: System-Centric IPC Provenance on Android
Scippa: System-Centric IPC Provenance on Android Michael Backes, Sven Bugiel, Sebastian Gerling Saarland Univeristy, Germany 2014 Annual Computer Security Applications Conference Presenter: Qi Wang 1 Android
More informationMiddleware MAC for Android. Stephen Smalley Trusted Systems Research National Security Agency
Middleware MAC for Android Stephen Smalley Trusted Systems Research National Security Agency Motivation Many attacks on Android can occur entirely at the middleware layer. Not directly visible to kernel
More informationCONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS CONTROL (CBAA AAC) FOR SMART PHONES
S SHARAVANAN AND R M BALAJEE: CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS CONTROL (CBAA AAC) FOR SMART PHONES DOI: 10.21917/ijsc.2016.0180 CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS
More informationMandatory Access Control for the Android Dalvik Virtual Machine
Mandatory Access Control for the Android Dalvik Virtual Machine Aline Bousquet 1, Jérémy Briffaut 1, Laurent Clevy 2, Christian Toinard 1, Benjamin Venelle 2 1 LIFO - ENSI de Bourges - first.last@ensi-bourges.fr
More informationMobile Security for Banking on Android Platform
Mobile Security for Banking on Android Platform Lukas Aron Petr Hanacek Faculty of Information Technology Brno University of Technology Bozetechova 2 Brno, Czech Republic {iaron, hanacek}@fit.vutbr.cz
More informationUser Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps
User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt
More informationDeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices Xueqiang Wang 1, Kun Sun 2, Yuewu Wang 1, Jiwu Jing 1 1 Institute of Information Engineering, CAS 2 College of William and Mary Mon,
More informationInvestigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection
Hou et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:227 DOI 10.1186/s13638-016-0711-4 RESEARCH Investigation of taint analysis for Smartphone-implicit taint detection and privacy
More informationPlatform-Centric Android Monitoring Modular and Efficient
Platform-Centric Android Monitoring Modular and Efficient Jan-Christoph Küster NICTA and Australian National University Andreas Bauer TU Munich, Germany, and NICTA The platform-centric approaches described
More informationAceDroid: Normalizing Diverse Android
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection Yousra Aafer*, Jianjun Huang*, Yi Sun*, Xiangyu Zhang*, Ninghui Li* and Chen Tian *Purdue University Futurewei Technologies
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationLecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015
Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models
More informationThe Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency
The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.
More informationPaddyFrog: systematically detecting confused deputy vulnerability in Android applications
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:2338 2349 Published online 30 January 2015 in Wiley Online Library (wileyonlinelibrary.com)..1179 RESEARCH ARTICLE PaddyFrog: systematically
More informationMobile Device and Platform Security Part II
CS 155 Spring 2018 Mobile Device and Platform Security Part II John Mitchell Two lectures on mobile security Introduction: platforms and trends Threat categories Physical, platform malware, malicious apps
More informationURANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security Daniel Schreckling, Stephan Huber, Focke Höhne, and Joachim Posegga Institute of IT-Security and Security Law University of
More informationA Survey of Android Technology
A Survey of Android Technology Shivam 1, Ranjana sharma 2 1 B.sc(H) 6thsemester,CCSIT,TMU,MORADABAD 2 Assistant Professor, CCSIT, TMU MORADABAD 1 shivamarora2015@gmail.com 2 sharmaranjana04@gmail.com ABSTRACT:
More informationVirtualSwindle: An Automated Attack Against In-App Billing on Android
Northeastern University Systems Security Lab VirtualSwindle: An Automated Attack Against In-App Billing on Android ASIACCS 2014 Collin Mulliner, William Robertson, Engin Kirda {crm,wkr,ek}[at]ccs.neu.edu
More informationAndroid Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin
Android Application Sandbox Thomas Bläsing DAI-Labor TU Berlin Agenda Introduction What is Android? Malware on smartphones Common countermeasures on the Android platform Use-Cases Design Conclusion Summary
More informationUnCovert: Evaluating thermal covert channels on Android systems. Pascal Wild
UnCovert: Evaluating thermal covert channels on Android systems Pascal Wild August 5, 2016 Contents Introduction v 1: Framework 1 1.1 Source...................................... 1 1.2 Sink.......................................
More informationEnforcing Multiple Security Policies for Android System*
2nd International Symposium on Computer, Communication, Control and Automation (3CA 2013) Enforcing Multiple Security Policies for System* Tao Guo guotao@itsec.gov.cn Puhan Zhang zhangph2008@gmail.com
More informationConstruction of Trusted Computing Platform Based on Android System
American Journal of Mobile Systems, Applications and Services Vol. 1, No.1, 2015, pp. 54-58 http://www.aiscience.org/journal/ajmsas Construction of Trusted Computing Platform Based on Android System Hui
More informationMobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest
More informationCS261 Scribe Notes: Secure Computation 1
CS261 Scribe Notes: Secure Computation 1 Scriber: Cameron Rasmussen October 24, 2018 1 Introduction It is often the case that code is being run locally on our system that isn t completely trusted, a prime
More informationOn Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, and Sebastian Weisgerber
More informationAndroid Analysis Tools. Yuan Tian
Android Analysis Tools Yuan Tian Malware are more creative: XcodeGhost More than 300 a pps are infected, including wechat and netease Collect device ID, Apple ID and p assword 10/3/15 CMU Mobile Security
More informationLecture 2 PLATFORM SECURITY IN ANDROID OS
Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation
More informationOS Security III: Sandbox and SFI
1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS
More informationLecture 9. PSiOS: Bring Your Own Privacy & Security to ios Devices. Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi and Thorsten Holz
Lecture 9 PSiOS: Bring Your Own Privacy & Security to ios Devices Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi and Thorsten Holz Operating Systems Practical December 3, 2014 OSP Lecture 9,
More informationMobile Applications on Vehicle Tracking
Mobile Applications on Vehicle Tracking Ahmed Yousif Ahmed Ibrahim and Dr Hala Eldaw Idris Faculty of Engineering, Al-Neelain University, Khartoum, Sudan Publishing Date: August 18, 2016 Abstract In last
More informationLecture 3 Android Internals
Lecture 3 Android Internals This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or
More informationRethinking Permission Enforcement Mechanism on Mobile Systems
Rethinking Permission Enforcement Mechanism on Mobile Systems Yuan Zhang, Min Yang, Guofei Gu, and Hao Chen Abstract To protect sensitive resources from unauthorized use, modern mobile systems, such as
More informationarxiv: v1 [cs.cr] 4 Sep 2012
Security issues in the Android cross-layer architecture Alessandro Armando University of Genova Via all Opera Pia, 13 IT-16145,Genova, Italy armando@dist.unige.it Alessio Merlo E-Campus University Via
More informationCSCE 813 Internet Security Final Exam Preview
CSCE 813 Internet Security Final Exam Preview Professor Lisa Luo Fall 2017 Coverage All contents! Week1 ~ Week 15 The nature of the exam: 12 questions: 3 multiple choices questions 1 true or false question
More informationAndroid System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015
Android System Architecture Android Application Fundamentals Applications in Android All source code, resources, and data are compiled into a single archive file. The file uses the.apk suffix and is used
More informationLintent: Towards Security Type-Checking of Android Applications
Lintent: Towards Security Type-Checking of Android Applications Michele Bugliesi, Stefano Calzavara, and Alvise Spanò Università Ca Foscari Venezia Abstract. The widespread adoption of Android devices
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationAndroid Taint Flow Analysis for App Sets
Android Taint Flow Analysis for App Sets William Klieber Lori Flynn ERT / SEI, arnegie Mellon University {weklieber, lflynn}@cert.org Amar Bhosale Limin Jia Lujo Bauer arnegie Mellon University {amarb,
More informationSecurity and privacy in your embedded systems
Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing
More informationReDroid: Prioritizing Data Flows and Sinks for App Security Transformation
FEAST 2017 ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation Ke Tian*, Gang Tan^, Daphne Yao*, Barbara Ryder* *Department of Computer Science Virginia Tech ^Department of CSE Penn
More informationThings You May Not Know About Android (Un)Packers: A Systematic Study based on Whole- System Emulation
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole- System Emulation Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng
More informationUnderstanding and Automatically Preventing Injection Attacks on Node.js
Understanding and Automatically Preventing Injection Attacks on Node.js Michael Pradel TU Darmstadt Joint work with Cristian Staicu (TU Darmstadt) and Ben Livshits (Microsoft Research, Redmond) 1 Why JavaScript?
More informationUranine: Real-time Privacy Leakage Monitoring without System Modification for Android
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Vaibhav Rastogi 1, Zhengyang Qu 2, Jedidiah McClurg 3, Yinzhi Cao 4, and Yan Chen 2 1 University of Wisconsin and Pennsylvania
More informationSECURITY PATTERN DETECTION AN ANDROID APPLICATION
SECURITY PATTERN DETECTION AN ANDROID APPLICATION Ahmad Talha Siddiqui* Dr. Munesh Chandra Trivedi** Abstract: The Android platform has about 100 applications level permissions that govern access to resources.
More informationWell, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via
Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers. Michael Cherny @chernymi Sagie Dulce @SagieSec
More informationGOOGLE S Android has dominated smart phone operating
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2015, VOL. 61, NO. 4, PP. 311 320 Manuscript received October 10, 2015; revised December, 2015. DOI: 10.1515/eletel-2015-0040 An Android Security Policy
More informationAn Introduction to Android. Jason Chen Developer Advocate Google I/O 2008
An Introduction to Android Jason Chen Developer Advocate Google I/O 2008 Background What is Android? Latest News 4,000,000,000 Internet and Mobile Phone Users, Worldwide 3,000,000,000 2,000,000,000 1,000,000,000
More informationAndroid Malware: they divide, we conquer
Android Malware: they divide, we conquer Igor Muttik *, Irina Mariuca Asavoae ** J. Blasco ***, T.M. Chen ***, H.K. Kalutarage *****, H.N. Nguyen ****, M. Roggenbach **, S.A. Shaikh **** * - Intel Security;
More informationIntroduction. Lecture 1. Operating Systems Practical. 5 October 2016
Introduction Lecture 1 Operating Systems Practical 5 October 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
More informationAutomatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus To cite this version: Alexandre
More informationEfficient Integrity Protection for Android Smartphone
International Journal of Science and Research (IJSR) Efficient Integrity Protection for Android Smartphone Pranjali N. Watkar 1, S. P. Karmore 2 1 Department of Computer Science and Engineering, G. H.
More informationFirefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D
Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based
More informationAndroid App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore
Android App Development Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Mobile devices (e.g., smartphone, tablet PCs, etc.) are increasingly becoming an essential part of human life
More informationKratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework Yuru Shao, Jason Ott, Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao University of Michigan, University of California Riverside
More informationInfrastructure Middleware (Part 3): Android Runtime Core & Native Libraries
Infrastructure Middleware (Part 3): Android Runtime Core & Native Libraries Douglas C. Schmidt d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt
More informationAndroid Internals and the Dalvik VM!
Android Internals and the Dalvik VM! Adam Champion, Andy Pyles, Boxuan Gu! Derived in part from presentations by Patrick Brady, Dan Bornstein, and Dan Morrill from Google (http://source.android.com/documentation)!
More informationID: Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version:
ID: 42511 Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information
More informationOpen Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010
Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced
More informationInteroperability framework for communication between processes running on different mobile operating systems
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Interoperability framework for communication between processes running on different mobile operating systems To cite this article:
More informationAccess Control for Plugins in Cordova-based Hybrid Applications
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationLaying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency
Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency Trusted Systems Research Conduct and sponsor research to provide information assurance for
More informationMinds-on: Android. Session 1
Minds-on: Android Session 1 Paulo Baltarejo Sousa Instituto Superior de Engenharia do Porto 2016 Outline Mobile devices Android OS Android architecture Android Studio Practice 1 / 33 2 / 33 Mobile devices
More informationPrivacy Panel: Usable and Quantifiable Mobile Privacy
Privacy Panel: Usable and Quantifiable Mobile Privacy Debmalya Biswas Iprova, Switzerland dbiswas@iprova.com Imad Aad University of Bern, Switzerland aad@iam.unibe.ch Gian Paolo Perrucci Nespresso, Switzerland
More informationITG Software Engineering
Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building
More informationAn Enhanced Security Policy Framework for Android
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to
More informationApplications Mobiles et Internet des Objets Introduction a l architecture d Android
Applications Mobiles et Internet des Objets Introduction a l architecture d Android Thibault CHOLEZ - thibault.cholez@loria.fr TELECOM Nancy - Universite de Lorraine LORIA - INRIA Nancy Grand-Est From
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno
CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,
More informationOld, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures
Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan ACM CODASPY 11 Joint work with Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg Feb 22, 2011
More informationANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA Jitendra Ingale, Parikshit mahalle SKNCOE pune,maharashtra,india Email: jits.ingale@gmail.com ABSTRACT: Google s Android is open source;
More informationStephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy. ACM CCS 2010, Chicago, USA
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy ACM CCS 2010, Chicago, USA Ad hoc defense against code injection: W X DEP Code injection unnecessary
More informationUniversität Augsburg
Universität Augsburg Model-Driven Code Generation for Information Flow Secure Systems with IFlow Kuzman Katkalov, Peter Fischer, Kurt Stenzel and Wolfgang Reif Report 2012-04 March 2012 Institut für Informatik
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,
More informationPhosphor: Illuminating Dynamic. Data Flow in Commodity JVMs
Phosphor: Illuminating Dynamic Fork me on Github Data Flow in Commodity JVMs Jonathan Bell and Gail Kaiser Columbia University, New York, NY USA Dynamic Data Flow Analysis: Taint Tracking Output that is
More informationProtection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger
Protection CSE473 - Spring 2008 Professor Jaeger www.cse.psu.edu/~tjaeger/cse473-s08/ Protection Protect yourself from untrustworthy users in a common space They may try to access your resources Or modify
More informationThe Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering. A Thesis in. Computer Science and Engineering
The Pennsylvania State University The Graduate School Department of Computer Science and Engineering DESIGN AND IMPLEMENTATION OF OVER-THE-AIR PARENTAL CONTROL FOR SMARTPHONES A Thesis in Computer Science
More informationHao Chen Benjamin Davis. University of California, Davis. HELIX Project Review Meeting, August 6,2010
Hao Chen Benjamin Davis University of California, Davis HELIX Project Review Meeting, August 6,2010 Goal: protect systems at high level Web services are highly attractive targets Over 60% of attacks target
More informationkguard++: Improving the Performance of kguard with Low-latency Code Inflation
kguard++: Improving the Performance of kguard with Low-latency Code Inflation Jordan P. Hendricks Brown University Abstract In this paper, we introduce low-latency code inflation for kguard, a GCC plugin
More informationANDROID NATIVE APP: INTRODUCTION TO ANDROID. Roberto Beraldi
ANDROID NATIVE APP: INTRODUCTION TO ANDROID Roberto Beraldi Role of an operating system APPLICATIONS OPERATING SYSTEM CPU MEMORY DEVICES Android = OS + Middleware Based on Linux Not just another distribution.
More informationMobile development initiation
Mobile development initiation Outline Mobile development: o Why? o How? o New issues Android ios 2 Mobile growth ¼ Internet access Sales of smartphones and tablets increase o + 70% tab Community 3 Why
More informationSafety First - Android sicher programmieren! Benjamin Reimold & Stephan Linzner
2011 Safety First - Android sicher programmieren! Benjamin Reimold & Stephan Linzner 7th July, 2011 Introducing Stephan Linzner Benjamin Reimold Freelance Software Engineer Mobile Developer Founder of
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationAdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android
AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android Paul Pearce 1, Adrienne Porter Felt 1, Gabriel Nunez 2, David Wagner 1 1 University of California, Berkeley 2 Sandia Na,onal Laboratory
More informationAndroid Security Lab WS 2013/14 Lab 2: Android Permission System
Saarland University Information Security & Cryptography Group Prof. Dr. Michael Backes saarland university computer science Android Security Lab WS 2013/14 M.Sc. Sven Bugiel Version 1.2 (November 12, 2013)
More informationAdaptive Android Kernel Live Patching
USENIX Security Symposium 2017 Adaptive Android Kernel Live Patching Yue Chen 1, Yulong Zhang 2, Zhi Wang 1, Liangzhao Xia 2, Chenfu Bao 2, Tao Wei 2 Florida State University 1 Baidu X-Lab 2 Android Kernel
More informationAnother difference is that the kernel includes only the suspend to memory mechanism, and not the suspend to hard disk, which is used on PCs.
9. Android is an open-source operating system for mobile devices. Nowadays, it has more than 1.4 billion monthly active users (statistic from September 2015) and the largest share on the mobile device
More informationAndroid System Development Day-4. Team Emertxe
Android System Development Day-4 Team Emertxe Android System Service Table of Content Introduction to service Inter Process Communication (IPC) Adding Custom Service Writing Custom HAL Compiling SDK Testing
More informationTaintDroid. Goal: detect private information leaving the device. Approach: Track the origin of each byte of data
TaintDroid Goal: detect private information leaving the device E.g. GPS position, contacts, photos Approach: Track the origin of each byte of data Each data byte b has an associated set Sb defining sources
More informationSandboxing an Android application through system call interposition
Sandboxing an Android application through system call interposition Contents Ransomware Sandboxing Android security model Trace an application One particular approach Ransomware Malicious piece of software
More information