TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android Applications

被引:0
作者
Hu, Xinwen [1 ]
机构
[1] Hunan Normal Univ, Changsha 410081, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Operating systems; Runtime; Codes; Access control; Information leakage; Receivers; Formal languages; Syntactics; Static analysis; Scalability; Android apps; permission-induced attacks; type systems; soundness proofs; K-framework; MODEL; RISK;
D O I
10.1109/ACCESS.2024.3487852
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android applications (apps) are ubiquitous in complex environments. Although permission- based access control mechanism in Android apps can ensure the proper access of information to a certain extent, it cannot enforce security policies on information propagation, which may cause permission-induced attacks. Our work is motivated by the problem of enforcing security policies on explicit and implicit information flows under the premise of the permission checks/requests at runtime in the Inter-Component Communication (ICC). To this end, we design a formal calculus for reasoning operations (e.g., permission checks and permission requests at runtime) and interactions (e.g., ICC) in Android apps. In addition, we introduce a novel type system based on the proposed formal calculus for checking secure information flow to prevent permission-induced attacks in Android apps. A soundness theorem of this type system is also proved with respect to non-interference property in Android apps.Finally, we realize a prototype Tysa based on the K-framework (K) and illustrate its effectiveness.
引用
收藏
页码:165026 / 165041
页数:16
相关论文
共 52 条
[1]  
[Anonymous], DEV ANDROID
[2]  
[Anonymous], 2017, NUMBER AVAILABLE APP
[3]  
[Anonymous], [22] K-Team, Inc. Online Available: http://www.k-team.com/
[4]  
AppBrain, 2020, Android and Google Play Statistics, Development Resources and Intelligence
[5]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[6]  
B R., AO Surgery Reference: Adult Trauma" [Online]. Available
[7]   Stack-based access control and secure information flow [J].
Banerjee, A ;
Naumann, DA .
JOURNAL OF FUNCTIONAL PROGRAMMING, 2005, 15 :131-177
[8]  
Blackshear S, 2015, ACM SIGPLAN NOTICES, V50, P163, DOI [10.1145/2814270.2814293, 10.1145/2858965.2814293]
[9]   DroidAutoML: A Microservice Architecture to Automate the Evaluation of Android Machine Learning Detection Systems [J].
Bromberg, Yerom-David ;
Gitzinger, Louison .
DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2020, 2020, 12135 :148-165
[10]  
Bugliesi M., Formal Techniques for Distributed Systems, V7892