QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android

Size: px
Start display at page:

Download "QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android"

Transcription

1 QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android Tobias Markmann 1 Dennis Gessner 2 Dirk Westhoff 3 1 HAW Hamburg, Germany 2 NEC Laboratories Europe, Heidelberg, Germany 3 HFU Furtwangen, Germany IEEE ICC Communications and Informations Systems Security Symposium 1/ 14

2 Motivation Android popularity increasing Privacy under attack! Soundcomber (NDSS, 2011), PlaceRaider (NDSS, 2013), Permission model confusing & inflexible 2/ 14 Source: PlaceRaider [2]

3 Android Security & Communication System Security Common Linux security High-level permissions Sandbox for apps High-level IPC 3/ 14 Source: Programming Android [3]

4 Android Security & Communication System Security Common Linux security High-level permissions Sandbox for apps High-level IPC Communication High-level Middleware Unicast, Broadcast & RPC Poorly secured 3/ 14 Source: Programming Android [3]

5 Objective Identifying privilege escalation Detecting illegal information flow Dishonest/Colluding apps Abused apps Prevent mobile privacy invasion Using information flow analysis 4/ 14

6 Related Work XManDroid (NDSS, 2012) Graph based App permissions Direct & indirect communication 5/ 14 Source: XManDroid [4]

7 Related Work XManDroid (NDSS, 2012) Graph based App permissions Direct & indirect communication IPC Inspection (USENIX Sec., 2011) Focus on permission redelegation Adjust IPC callee permissions Only reduced, never extended Merely message independent interface-level permission control. 5/ 14 Source: XManDroid [4]

8 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection 6/ 14

9 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) 6/ 14

10 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) FlowGraphService Real-time collection Communication graph Containing all running apps Quantitative data flow 6/ 14

11 IPC Monitoring with FlowGraphService IPC Monitoring At IPC boundary High-level communication methods Forwarding data collection FlowGraphService Real-time collection Communication graph Containing all running apps Quantitative data flow Monitoring Characteristics Sender (PID, UID) Receiver (PID, UID) Size Taint Tag (,,,, ) Limit enforcement Enforce data flow limits Based on taint tags Countermeasures Kill app Block IPC message 6/ 14

12 Utilising Dynamic Taint Tagging TaintDroid (OSDI, 2010) Dynamic taint tagging Tag = data source Dalvik VM only, no native code Across IPC 7/ 14 Source: TaintDroid [6]

13 Utilising Dynamic Taint Tagging Taint Tagged IPC TaintDroid (OSDI, 2010) Dynamic taint tagging Interpreted Code Trusted Application Taint Source (1) Untrusted Application Trusted Library (8) Taint Sink Tag = data source Dalvik VM only, no native code Across IPC Userspace (2) Dalvik VM Interpreter Binder IPC Library (3) (4) Virtual Taint Map Binder Hook (5) (6) Virtual Taint Map Binder Hook (7) (9) Dalvik VM Interpreter Binder IPC Library Kernel BinderKernel Module 7/ 14 Source: TaintDroid [6]

14 Visualisation Current graph via custom fgdump-tool Graphviz for rendering Example Snapshot UID UID Tag: IMEI Throughput: 1664 Bytes/min Tag: CONTACTS Throughput: 1664 Bytes/min Tag: CONTACTS Throughput: 3968 Bytes/min android.process.media com.example.servicecomreceiver UID com.example.servicecomsender 8/ 14

15 Evaluation Cirteria Privilege escalation sensitive data propagates across apps Works with standard Android SDK APIs Test Scenarios i) Conspiring apps ii) Confused-deputy 9/ 14

16 Scenario: Conspiring apps Setup Attack scenario: conspiring apps Start Activity Intent <<component>> WeatherEntryActivity <<component>> MappingActivity Service Call Service Reply Service Call Activity Result <<component>> WeatherWidget <<component>> WeatherReporterService Service Reply Objective Innocent looking apps siphoning off contact data to send it off-site. 10/ 14

17 Scenario: Conspiring apps Execution T 1 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14

18 Scenario: Conspiring apps Execution T 2 UID com.example.snr_a.custommapping UID bytes 1 contact Tag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14

19 Scenario: Conspiring apps Execution T 3 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID Tag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14

20 Scenario: Conspiring apps Execution T 3 to T 4 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID XTag: CONTACTS Throughput: 216 Bytes/min com.example.snr_a.weatherreporter UID com.example.snr_a.weatherwidget 11/ 14

21 Scenario: Conspiring apps Execution T 4 UID Tag: CONTACTS Throughput: 828 Bytes/min com.example.snr_a.custommapping UID com.example.snr_a.weatherreporter 11/ 14

22 Scenario: Confused-deputy Attack scenario: confused-deputy <<component>> EvilSMSBrowser Activity Service Call <<component>> SMSFormatterService Service Reply <<component>> NiceSMSBrowser Activity Service Reply Service Call Objective SMS theft due to insecure/open API. Execution See our paper. 12/ 14

23 Conclusion & Outlook Conclusion Mitigate privilege escalation Quantitative IPC monitoring Limitation: Not monitoring IP-/UNIX-sockets 13/ 14

24 Conclusion & Outlook Conclusion Mitigate privilege escalation Quantitative IPC monitoring Limitation: Not monitoring IP-/UNIX-sockets Outlook Analyse apps from Play Store Investigating data flow threshold heuristics 13/ 14

25 Questions? Tobias Markmann Department of Computer Science HAW Hamburg [1] R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in NDSS, The Internet Society, [2] R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia, PlaceRaider: Virtual Theft in Physical Spaces with Smartphones, CoRR, vol. abs/ , [3] Z. R. Mednieks et al., Programming Android: Java programming for the new generation of mobile devices. O Reilly & Associates, Inc., second ed., [4] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, Technical Report TR , Technische Universität Darmstadt, Apr [5] A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission re-delegation: attacks and defenses, in Proceedings of the 20th USENIX conference on Security, SEC 11, (Berkeley, CA, USA), pp , USENIX Association, [6] W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, in OSDI (R. H. Arpaci-Dusseau and B. Chen, eds.), pp , USENIX Association, / 14

2 Lecture Embedded System Security A.-R. Darmstadt, Android Security Extensions

2 Lecture Embedded System Security A.-R. Darmstadt, Android Security Extensions 2 Lecture Embedded System Security A.-R. Sadeghi, @TU Darmstadt, 2011-2014 Android Security Extensions App A Perm. P 1 App B Perm. P 2 Perm. P 3 Kirin [2009] Reference Monitor Prevents the installation

More information

STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES

STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES STUDY OF PRIVILEGE ESCALATION ATTACK ON ANDROID AND ITS COUNTERMEASURES REJO MATHEW Department of Information Technology, NMIMS University, MPSTME, Mumbai, Maharashtra 400056, India rejo.mathew@nmims.edu

More information

Lecture Embedded System Security

Lecture Embedded System Security Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2011 Overview Introduction Android Software Stack Android

More information

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014 6.858 Quiz 2 Review Android Security Haogang Chen Nov 24, 2014 1 Security layers Layer Role Reference Monitor Mandatory Access Control (MAC) for RPC: enforce access control policy for shared resources

More information

Android Based Business Card Scanner: An OCR Based Approach

Android Based Business Card Scanner: An OCR Based Approach Android Based Business Card Scanner: An OCR Based Approach Prof. Kaushal Patel 1, Prof. Amit Choksi 2 Department of Electronics & Telecommunication Engineering, Birla Vishvakarma Mahavidyalaya engineering

More information

An Effective Access Control Scheme for Preventing Permission Leak in Android

An Effective Access Control Scheme for Preventing Permission Leak in Android An Effective Access Control Scheme for Preventing Permission Leak in Android Longfei Wu 1, Xiaojiang Du 1, and Hongli Zhang 2 1 Department of Computer and Information Science, Temple University, Philadelphia,

More information

Towards a Systematic Study of the Covert Channel Attacks in Smartphones

Towards a Systematic Study of the Covert Channel Attacks in Smartphones Towards a Systematic Study of the Covert Channel Attacks in Smartphones Swarup Chandra 1, Zhiqiang Lin 1, Ashish Kundu 2, and Latifur Khan 1 1 University of Texas at Dallas, Richardson, TX, USA {swarup.chandra,zhiqiang.lin,lkhan}@utdallas.edu

More information

Static Verification of Android Security

Static Verification of Android Security Static Verification of Android Security Michele Bugliesi based on work with Stefano Calzavara and Alvise Spanò appeared at FORTE/FMOODS Int. Conf. 2013 Università Ca Foscari Venezia Dipartimento di Scienze

More information

Modeling the Android Platform

Modeling the Android Platform Modeling the Android Platform Étienne Payet LIM-ERIMIA, université de la Réunion BYTECODE 13 Saturday 23 March 2013 Étienne Payet (LIM-ERIMIA) Modeling the Android Platform BYTECODE 13 1 / 50 Reunion,

More information

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime

SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications at Runtime Jianmeng Huang 2017,1,12 Outline 1 Motivation Intro Current solutions Our goals 2 SieveDroid Our solution

More information

Flexible and Fine- Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies

Flexible and Fine- Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Flexible and Fine- Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Sven Bugiel Joint work with Stephan Heuser and Ahmad- Reza Sadeghi Cryptography and InformaAon Security

More information

Lecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical

Lecture 08. Android Permissions Demystified. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. Operating Systems Practical Lecture 08 Android Permissions Demystified Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner Operating Systems Practical 20 November, 2013 OSP Lecture 08, Android Permissions Demystified

More information

Scippa: System-Centric IPC Provenance on Android

Scippa: System-Centric IPC Provenance on Android Scippa: System-Centric IPC Provenance on Android Michael Backes, Sven Bugiel, Sebastian Gerling Saarland Univeristy, Germany 2014 Annual Computer Security Applications Conference Presenter: Qi Wang 1 Android

More information

Middleware MAC for Android. Stephen Smalley Trusted Systems Research National Security Agency

Middleware MAC for Android. Stephen Smalley Trusted Systems Research National Security Agency Middleware MAC for Android Stephen Smalley Trusted Systems Research National Security Agency Motivation Many attacks on Android can occur entirely at the middleware layer. Not directly visible to kernel

More information

CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS CONTROL (CBAA AAC) FOR SMART PHONES

CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS CONTROL (CBAA AAC) FOR SMART PHONES S SHARAVANAN AND R M BALAJEE: CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS CONTROL (CBAA AAC) FOR SMART PHONES DOI: 10.21917/ijsc.2016.0180 CONTEXT BASED ANDROID APPLICATION ADMINISTRATIVE ACCESS

More information

Mandatory Access Control for the Android Dalvik Virtual Machine

Mandatory Access Control for the Android Dalvik Virtual Machine Mandatory Access Control for the Android Dalvik Virtual Machine Aline Bousquet 1, Jérémy Briffaut 1, Laurent Clevy 2, Christian Toinard 1, Benjamin Venelle 2 1 LIFO - ENSI de Bourges - first.last@ensi-bourges.fr

More information

Mobile Security for Banking on Android Platform

Mobile Security for Banking on Android Platform Mobile Security for Banking on Android Platform Lukas Aron Petr Hanacek Faculty of Information Technology Brno University of Technology Bozetechova 2 Brno, Czech Republic {iaron, hanacek}@fit.vutbr.cz

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices Xueqiang Wang 1, Kun Sun 2, Yuewu Wang 1, Jiwu Jing 1 1 Institute of Information Engineering, CAS 2 College of William and Mary Mon,

More information

Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection

Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection Hou et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:227 DOI 10.1186/s13638-016-0711-4 RESEARCH Investigation of taint analysis for Smartphone-implicit taint detection and privacy

More information

Platform-Centric Android Monitoring Modular and Efficient

Platform-Centric Android Monitoring Modular and Efficient Platform-Centric Android Monitoring Modular and Efficient Jan-Christoph Küster NICTA and Australian National University Andreas Bauer TU Munich, Germany, and NICTA The platform-centric approaches described

More information

AceDroid: Normalizing Diverse Android

AceDroid: Normalizing Diverse Android AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection Yousra Aafer*, Jianjun Huang*, Yi Sun*, Xiangyu Zhang*, Ninghui Li* and Chen Tian *Purdue University Futurewei Technologies

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015 Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:2338 2349 Published online 30 January 2015 in Wiley Online Library (wileyonlinelibrary.com)..1179 RESEARCH ARTICLE PaddyFrog: systematically

More information

Mobile Device and Platform Security Part II

Mobile Device and Platform Security Part II CS 155 Spring 2018 Mobile Device and Platform Security Part II John Mitchell Two lectures on mobile security Introduction: platforms and trends Threat categories Physical, platform malware, malicious apps

More information

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security Daniel Schreckling, Stephan Huber, Focke Höhne, and Joachim Posegga Institute of IT-Security and Security Law University of

More information

A Survey of Android Technology

A Survey of Android Technology A Survey of Android Technology Shivam 1, Ranjana sharma 2 1 B.sc(H) 6thsemester,CCSIT,TMU,MORADABAD 2 Assistant Professor, CCSIT, TMU MORADABAD 1 shivamarora2015@gmail.com 2 sharmaranjana04@gmail.com ABSTRACT:

More information

VirtualSwindle: An Automated Attack Against In-App Billing on Android

VirtualSwindle: An Automated Attack Against In-App Billing on Android Northeastern University Systems Security Lab VirtualSwindle: An Automated Attack Against In-App Billing on Android ASIACCS 2014 Collin Mulliner, William Robertson, Engin Kirda {crm,wkr,ek}[at]ccs.neu.edu

More information

Android Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin

Android Application Sandbox. Thomas Bläsing DAI-Labor TU Berlin Android Application Sandbox Thomas Bläsing DAI-Labor TU Berlin Agenda Introduction What is Android? Malware on smartphones Common countermeasures on the Android platform Use-Cases Design Conclusion Summary

More information

UnCovert: Evaluating thermal covert channels on Android systems. Pascal Wild

UnCovert: Evaluating thermal covert channels on Android systems. Pascal Wild UnCovert: Evaluating thermal covert channels on Android systems Pascal Wild August 5, 2016 Contents Introduction v 1: Framework 1 1.1 Source...................................... 1 1.2 Sink.......................................

More information

Enforcing Multiple Security Policies for Android System*

Enforcing Multiple Security Policies for Android System* 2nd International Symposium on Computer, Communication, Control and Automation (3CA 2013) Enforcing Multiple Security Policies for System* Tao Guo guotao@itsec.gov.cn Puhan Zhang zhangph2008@gmail.com

More information

Construction of Trusted Computing Platform Based on Android System

Construction of Trusted Computing Platform Based on Android System American Journal of Mobile Systems, Applications and Services Vol. 1, No.1, 2015, pp. 54-58 http://www.aiscience.org/journal/ajmsas Construction of Trusted Computing Platform Based on Android System Hui

More information

Mobile Platform Security Architectures A perspective on their evolution

Mobile Platform Security Architectures A perspective on their evolution Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest

More information

CS261 Scribe Notes: Secure Computation 1

CS261 Scribe Notes: Secure Computation 1 CS261 Scribe Notes: Secure Computation 1 Scriber: Cameron Rasmussen October 24, 2018 1 Introduction It is often the case that code is being run locally on our system that isn t completely trusted, a prime

More information

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, and Sebastian Weisgerber

More information

Android Analysis Tools. Yuan Tian

Android Analysis Tools. Yuan Tian Android Analysis Tools Yuan Tian Malware are more creative: XcodeGhost More than 300 a pps are infected, including wechat and netease Collect device ID, Apple ID and p assword 10/3/15 CMU Mobile Security

More information

Lecture 2 PLATFORM SECURITY IN ANDROID OS

Lecture 2 PLATFORM SECURITY IN ANDROID OS Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation

More information

OS Security III: Sandbox and SFI

OS Security III: Sandbox and SFI 1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS

More information

Lecture 9. PSiOS: Bring Your Own Privacy & Security to ios Devices. Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi and Thorsten Holz

Lecture 9. PSiOS: Bring Your Own Privacy & Security to ios Devices. Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi and Thorsten Holz Lecture 9 PSiOS: Bring Your Own Privacy & Security to ios Devices Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi and Thorsten Holz Operating Systems Practical December 3, 2014 OSP Lecture 9,

More information

Mobile Applications on Vehicle Tracking

Mobile Applications on Vehicle Tracking Mobile Applications on Vehicle Tracking Ahmed Yousif Ahmed Ibrahim and Dr Hala Eldaw Idris Faculty of Engineering, Al-Neelain University, Khartoum, Sudan Publishing Date: August 18, 2016 Abstract In last

More information

Lecture 3 Android Internals

Lecture 3 Android Internals Lecture 3 Android Internals This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or

More information

Rethinking Permission Enforcement Mechanism on Mobile Systems

Rethinking Permission Enforcement Mechanism on Mobile Systems Rethinking Permission Enforcement Mechanism on Mobile Systems Yuan Zhang, Min Yang, Guofei Gu, and Hao Chen Abstract To protect sensitive resources from unauthorized use, modern mobile systems, such as

More information

arxiv: v1 [cs.cr] 4 Sep 2012

arxiv: v1 [cs.cr] 4 Sep 2012 Security issues in the Android cross-layer architecture Alessandro Armando University of Genova Via all Opera Pia, 13 IT-16145,Genova, Italy armando@dist.unige.it Alessio Merlo E-Campus University Via

More information

CSCE 813 Internet Security Final Exam Preview

CSCE 813 Internet Security Final Exam Preview CSCE 813 Internet Security Final Exam Preview Professor Lisa Luo Fall 2017 Coverage All contents! Week1 ~ Week 15 The nature of the exam: 12 questions: 3 multiple choices questions 1 true or false question

More information

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015 Android System Architecture Android Application Fundamentals Applications in Android All source code, resources, and data are compiled into a single archive file. The file uses the.apk suffix and is used

More information

Lintent: Towards Security Type-Checking of Android Applications

Lintent: Towards Security Type-Checking of Android Applications Lintent: Towards Security Type-Checking of Android Applications Michele Bugliesi, Stefano Calzavara, and Alvise Spanò Università Ca Foscari Venezia Abstract. The widespread adoption of Android devices

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

Android Taint Flow Analysis for App Sets

Android Taint Flow Analysis for App Sets Android Taint Flow Analysis for App Sets William Klieber Lori Flynn ERT / SEI, arnegie Mellon University {weklieber, lflynn}@cert.org Amar Bhosale Limin Jia Lujo Bauer arnegie Mellon University {amarb,

More information

Security and privacy in your embedded systems

Security and privacy in your embedded systems Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing

More information

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation FEAST 2017 ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation Ke Tian*, Gang Tan^, Daphne Yao*, Barbara Ryder* *Department of Computer Science Virginia Tech ^Department of CSE Penn

More information

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole- System Emulation

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole- System Emulation Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole- System Emulation Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng

More information

Understanding and Automatically Preventing Injection Attacks on Node.js

Understanding and Automatically Preventing Injection Attacks on Node.js Understanding and Automatically Preventing Injection Attacks on Node.js Michael Pradel TU Darmstadt Joint work with Cristian Staicu (TU Darmstadt) and Ben Livshits (Microsoft Research, Redmond) 1 Why JavaScript?

More information

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Vaibhav Rastogi 1, Zhengyang Qu 2, Jedidiah McClurg 3, Yinzhi Cao 4, and Yan Chen 2 1 University of Wisconsin and Pennsylvania

More information

SECURITY PATTERN DETECTION AN ANDROID APPLICATION

SECURITY PATTERN DETECTION AN ANDROID APPLICATION SECURITY PATTERN DETECTION AN ANDROID APPLICATION Ahmad Talha Siddiqui* Dr. Munesh Chandra Trivedi** Abstract: The Android platform has about 100 applications level permissions that govern access to resources.

More information

Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via

Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Well, That Escalated Quickly! How abusing the Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers. Michael Cherny @chernymi Sagie Dulce @SagieSec

More information

GOOGLE S Android has dominated smart phone operating

GOOGLE S Android has dominated smart phone operating INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2015, VOL. 61, NO. 4, PP. 311 320 Manuscript received October 10, 2015; revised December, 2015. DOI: 10.1515/eletel-2015-0040 An Android Security Policy

More information

An Introduction to Android. Jason Chen Developer Advocate Google I/O 2008

An Introduction to Android. Jason Chen Developer Advocate Google I/O 2008 An Introduction to Android Jason Chen Developer Advocate Google I/O 2008 Background What is Android? Latest News 4,000,000,000 Internet and Mobile Phone Users, Worldwide 3,000,000,000 2,000,000,000 1,000,000,000

More information

Android Malware: they divide, we conquer

Android Malware: they divide, we conquer Android Malware: they divide, we conquer Igor Muttik *, Irina Mariuca Asavoae ** J. Blasco ***, T.M. Chen ***, H.K. Kalutarage *****, H.N. Nguyen ****, M. Roggenbach **, S.A. Shaikh **** * - Intel Security;

More information

Introduction. Lecture 1. Operating Systems Practical. 5 October 2016

Introduction. Lecture 1. Operating Systems Practical. 5 October 2016 Introduction Lecture 1 Operating Systems Practical 5 October 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

More information

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus To cite this version: Alexandre

More information

Efficient Integrity Protection for Android Smartphone

Efficient Integrity Protection for Android Smartphone International Journal of Science and Research (IJSR) Efficient Integrity Protection for Android Smartphone Pranjali N. Watkar 1, S. P. Karmore 2 1 Department of Computer Science and Engineering, G. H.

More information

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D

Firefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based

More information

Android App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore

Android App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Android App Development Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Mobile devices (e.g., smartphone, tablet PCs, etc.) are increasingly becoming an essential part of human life

More information

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework Yuru Shao, Jason Ott, Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao University of Michigan, University of California Riverside

More information

Infrastructure Middleware (Part 3): Android Runtime Core & Native Libraries

Infrastructure Middleware (Part 3): Android Runtime Core & Native Libraries Infrastructure Middleware (Part 3): Android Runtime Core & Native Libraries Douglas C. Schmidt d.schmidt@vanderbilt.edu www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt

More information

Android Internals and the Dalvik VM!

Android Internals and the Dalvik VM! Android Internals and the Dalvik VM! Adam Champion, Andy Pyles, Boxuan Gu! Derived in part from presentations by Patrick Brady, Dan Bornstein, and Dan Morrill from Google (http://source.android.com/documentation)!

More information

ID: Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version:

ID: Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version: ID: 42511 Sample Name: YNtbLvNHuo Cookbook: defaultandroidfilecookbook.jbs Time: 14:44:34 Date: 12/01/2018 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information

More information

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced

More information

Interoperability framework for communication between processes running on different mobile operating systems

Interoperability framework for communication between processes running on different mobile operating systems IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Interoperability framework for communication between processes running on different mobile operating systems To cite this article:

More information

Access Control for Plugins in Cordova-based Hybrid Applications

Access Control for Plugins in Cordova-based Hybrid Applications 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency Trusted Systems Research Conduct and sponsor research to provide information assurance for

More information

Minds-on: Android. Session 1

Minds-on: Android. Session 1 Minds-on: Android Session 1 Paulo Baltarejo Sousa Instituto Superior de Engenharia do Porto 2016 Outline Mobile devices Android OS Android architecture Android Studio Practice 1 / 33 2 / 33 Mobile devices

More information

Privacy Panel: Usable and Quantifiable Mobile Privacy

Privacy Panel: Usable and Quantifiable Mobile Privacy Privacy Panel: Usable and Quantifiable Mobile Privacy Debmalya Biswas Iprova, Switzerland dbiswas@iprova.com Imad Aad University of Bern, Switzerland aad@iam.unibe.ch Gian Paolo Perrucci Nespresso, Switzerland

More information

ITG Software Engineering

ITG Software Engineering Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building

More information

An Enhanced Security Policy Framework for Android

An Enhanced Security Policy Framework for Android All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to

More information

Applications Mobiles et Internet des Objets Introduction a l architecture d Android

Applications Mobiles et Internet des Objets Introduction a l architecture d Android Applications Mobiles et Internet des Objets Introduction a l architecture d Android Thibault CHOLEZ - thibault.cholez@loria.fr TELECOM Nancy - Universite de Lorraine LORIA - INRIA Nancy Grand-Est From

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan ACM CODASPY 11 Joint work with Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg Feb 22, 2011

More information

ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA

ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA Jitendra Ingale, Parikshit mahalle SKNCOE pune,maharashtra,india Email: jits.ingale@gmail.com ABSTRACT: Google s Android is open source;

More information

Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy. ACM CCS 2010, Chicago, USA

Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy. ACM CCS 2010, Chicago, USA Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy ACM CCS 2010, Chicago, USA Ad hoc defense against code injection: W X DEP Code injection unnecessary

More information

Universität Augsburg

Universität Augsburg Universität Augsburg Model-Driven Code Generation for Information Flow Secure Systems with IFlow Kuzman Katkalov, Peter Fischer, Kurt Stenzel and Wolfgang Reif Report 2012-04 March 2012 Institut für Informatik

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

Phosphor: Illuminating Dynamic. Data Flow in Commodity JVMs

Phosphor: Illuminating Dynamic. Data Flow in Commodity JVMs Phosphor: Illuminating Dynamic Fork me on Github Data Flow in Commodity JVMs Jonathan Bell and Gail Kaiser Columbia University, New York, NY USA Dynamic Data Flow Analysis: Taint Tracking Output that is

More information

Protection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger

Protection. CSE473 - Spring Professor Jaeger.   CSE473 Operating Systems - Spring Professor Jaeger Protection CSE473 - Spring 2008 Professor Jaeger www.cse.psu.edu/~tjaeger/cse473-s08/ Protection Protect yourself from untrustworthy users in a common space They may try to access your resources Or modify

More information

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering. A Thesis in. Computer Science and Engineering

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering. A Thesis in. Computer Science and Engineering The Pennsylvania State University The Graduate School Department of Computer Science and Engineering DESIGN AND IMPLEMENTATION OF OVER-THE-AIR PARENTAL CONTROL FOR SMARTPHONES A Thesis in Computer Science

More information

Hao Chen Benjamin Davis. University of California, Davis. HELIX Project Review Meeting, August 6,2010

Hao Chen Benjamin Davis. University of California, Davis. HELIX Project Review Meeting, August 6,2010 Hao Chen Benjamin Davis University of California, Davis HELIX Project Review Meeting, August 6,2010 Goal: protect systems at high level Web services are highly attractive targets Over 60% of attacks target

More information

kguard++: Improving the Performance of kguard with Low-latency Code Inflation

kguard++: Improving the Performance of kguard with Low-latency Code Inflation kguard++: Improving the Performance of kguard with Low-latency Code Inflation Jordan P. Hendricks Brown University Abstract In this paper, we introduce low-latency code inflation for kguard, a GCC plugin

More information

ANDROID NATIVE APP: INTRODUCTION TO ANDROID. Roberto Beraldi

ANDROID NATIVE APP: INTRODUCTION TO ANDROID. Roberto Beraldi ANDROID NATIVE APP: INTRODUCTION TO ANDROID Roberto Beraldi Role of an operating system APPLICATIONS OPERATING SYSTEM CPU MEMORY DEVICES Android = OS + Middleware Based on Linux Not just another distribution.

More information

Mobile development initiation

Mobile development initiation Mobile development initiation Outline Mobile development: o Why? o How? o New issues Android ios 2 Mobile growth ¼ Internet access Sales of smartphones and tablets increase o + 70% tab Community 3 Why

More information

Safety First - Android sicher programmieren! Benjamin Reimold & Stephan Linzner

Safety First - Android sicher programmieren! Benjamin Reimold & Stephan Linzner 2011 Safety First - Android sicher programmieren! Benjamin Reimold & Stephan Linzner 7th July, 2011 Introducing Stephan Linzner Benjamin Reimold Freelance Software Engineer Mobile Developer Founder of

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android

AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android Paul Pearce 1, Adrienne Porter Felt 1, Gabriel Nunez 2, David Wagner 1 1 University of California, Berkeley 2 Sandia Na,onal Laboratory

More information

Android Security Lab WS 2013/14 Lab 2: Android Permission System

Android Security Lab WS 2013/14 Lab 2: Android Permission System Saarland University Information Security & Cryptography Group Prof. Dr. Michael Backes saarland university computer science Android Security Lab WS 2013/14 M.Sc. Sven Bugiel Version 1.2 (November 12, 2013)

More information

Adaptive Android Kernel Live Patching

Adaptive Android Kernel Live Patching USENIX Security Symposium 2017 Adaptive Android Kernel Live Patching Yue Chen 1, Yulong Zhang 2, Zhi Wang 1, Liangzhao Xia 2, Chenfu Bao 2, Tao Wei 2 Florida State University 1 Baidu X-Lab 2 Android Kernel

More information

Another difference is that the kernel includes only the suspend to memory mechanism, and not the suspend to hard disk, which is used on PCs.

Another difference is that the kernel includes only the suspend to memory mechanism, and not the suspend to hard disk, which is used on PCs. 9. Android is an open-source operating system for mobile devices. Nowadays, it has more than 1.4 billion monthly active users (statistic from September 2015) and the largest share on the mobile device

More information

Android System Development Day-4. Team Emertxe

Android System Development Day-4. Team Emertxe Android System Development Day-4 Team Emertxe Android System Service Table of Content Introduction to service Inter Process Communication (IPC) Adding Custom Service Writing Custom HAL Compiling SDK Testing

More information

TaintDroid. Goal: detect private information leaving the device. Approach: Track the origin of each byte of data

TaintDroid. Goal: detect private information leaving the device. Approach: Track the origin of each byte of data TaintDroid Goal: detect private information leaving the device E.g. GPS position, contacts, photos Approach: Track the origin of each byte of data Each data byte b has an associated set Sb defining sources

More information

Sandboxing an Android application through system call interposition

Sandboxing an Android application through system call interposition Sandboxing an Android application through system call interposition Contents Ransomware Sandboxing Android security model Trace an application One particular approach Ransomware Malicious piece of software

More information