Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting

被引:1
作者
Ziadia, Marwa [1 ]
Mejri, Mohamed [1 ]
Fattahi, Jaouhar [1 ]
机构
[1] Laval Univ, Dept Comp Sci & Software Engn, 2325 Rue Univ, Quebec City, PQ G1V 0A6, Canada
来源
NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES | 2021年 / 337卷
基金
加拿大自然科学与工程研究理事会;
关键词
Policy Enforcement; Smali; Formal methods; LTL-logic; Program rewriting;
D O I
10.3233/FAIA210011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the wide variety of applications offered by Android, this system has been able to dominate the smartphone market. These applications provide all kinds of features and services that have become highly requested and welcomed by users. Besides, these applications represent risky vehicles for malware on Android devices. In this paper, we propose a novel formal technique to enforce the security of Android applications. We start off with an untrusted Android application and a security policy, and we end up in a new version of the application that behaves according to the policy. To ensure the correctness of results, we use formal methods in each step of the process, either in the system and the security policy specification or in the enforcement technique itself. The target application is reverse-engineered to its assembly-like code, Smali. An executable semantics called k-Smali was defined for this code using a language definitional framework, called k Framework. Security policies are specified in LTL-logic. The enforcement step consists of integrating the LTL formula in the k-Smali program using rewriting. It aims to rewrite the system specification automatically so that it satisfies the requested formula.
引用
收藏
页码:85 / 98
页数:14
相关论文
共 17 条
  • [1] FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
    Sui, Guangye
    Mejri, Mohamed
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 204 - 211
  • [2] Dynamic Security Policy Enforcement on Android
    Vanco, Matus
    Aron, Lukas
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 141 - 148
  • [3] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [4] Security Enforcement by Rewriting: An Algebraic Approach
    Sui, Guangye
    Mejri, Mohamed
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 311 - 321
  • [5] Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications
    Compagna, Luca
    dos Santos, Daniel R.
    Ponta, Serena Elisa
    Ranise, Silvio
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 321 - 328
  • [6] Using Edit Automata for Rewriting-Based Security Enforcement
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 175 - +
  • [7] CRePE: Context-Related Policy Enforcement for Android
    Conti, Mauro
    Vu Then Nga Nguyen
    Crispo, Bruno
    INFORMATION SECURITY, 2011, 6531 : 331 - +
  • [8] ProSPEC: Proactive Security Policy Enforcement for Containers
    Kermabon-Bobinnec, Hugo
    Gholipourchoubeh, Mahmood
    Bagheri, Sima
    Majumdar, Suryadipta
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 155 - 166
  • [9] Security policy enforcement for networked smart objects
    Sicari, Sabrina
    Rizzardi, Alessandra
    Miorandi, Daniele
    Cappiello, Cinzia
    Coen-Porisini, Alberto
    COMPUTER NETWORKS, 2016, 108 : 133 - 147
  • [10] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270