A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems

被引:2
作者
Krupp, Brian [1 ]
Sridhar, Nigamanth [1 ]
Zhao, Wenbing [1 ]
机构
[1] Cleveland State Univ, Cleveland, OH 44115 USA
来源
2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013) | 2013年
关键词
D O I
10.1109/ICDCSW.2013.6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device utilization continues to experience considerable growth and the privacy and security of these devices are becoming more critical with their continued rise in utilization. In this paper, we discuss the components of a mobile operating system that require enhancements in the security and privacy controls that are inherent in modern mobile operating systems. We then propose a policy that can be used to provide the semantics of defining additional security and privacy controls. Using this policy, we propose a framework that can be utilized by an application to enforce a user-defined policy while taking into account the computing constraints of a mobile platform. We then describe the implementation of a limited prototype of this framework and demonstrate its effectiveness in enforcing a user-defined policy.
引用
收藏
页码:404 / 409
页数:6
相关论文
共 10 条
[1]  
Adida B., 2008, Proceedings of the 17th international conference on World Wide Web, P517, DOI DOI 10.1145/1367497.1367568
[2]  
[Anonymous], 2012, P 10 INT C MOB SYST
[3]  
[Anonymous], 2012, Internet Security Threat Report
[4]  
[Anonymous], 2010, 9 USENIX S OPERATIN, DOI DOI 10.1145/2494522
[5]   An Android runtime security policy enforcement framework [J].
Banuri, Hammad ;
Alam, Masoom ;
Khan, Shahryar ;
Manzoor, Jawad ;
Ali, Bahar ;
Khan, Yasar ;
Yaseen, Mohsin ;
Tahir, Mir Nauman ;
Ali, Tamleek ;
Alam, Quratulain ;
Zhang, Xinwen .
PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) :631-641
[6]  
Gibler C., 2012, Trust 2012, V7344, P291, DOI [10.1007/978- 3- 642-30921-2 _17, DOI 10.1007/978-3-642-30921-2_17]
[7]  
Juniper, 2012, 2011 MOB THREATS REP
[8]  
Miller C., 2012, IOS HACKERS HDB
[9]  
Zhaohui Wang, 2012, Proceedings of the 2012 13th IEEE International Conference on Mobile Data Management (MDM), P52, DOI 10.1109/MDM.2012.31
[10]  
Zhou YJ, 2011, LECT NOTES COMPUT SC, V6740, P93, DOI 10.1007/978-3-642-21599-5_7