Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification

被引:28
作者
Bagheri, Hamid [1 ,2 ]
Kang, Eunsuk [1 ]
Malek, Sam [2 ]
Jackson, Daniel [1 ]
机构
[1] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
[2] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
来源
FM 2015: FORMAL METHODS | 2015年 / 9109卷
关键词
D O I
10.1007/978-3-319-19249-9_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restrictions on the operations that each application can perform. In this paper, we perform an analysis of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential flaws in the protocol. A study of real-world Android applications corroborates our finding that the flaws in the Android permission protocol can have severe security implications, in some cases allowing the attacker to bypass the permission checks entirely.
引用
收藏
页码:73 / 89
页数:17
相关论文
共 19 条
[1]  
Andoni A, EVALUATING SMALL SCO
[2]  
[Anonymous], IEEE T SOFTWARE ENG
[3]  
[Anonymous], 2012, P 19 ANN S NETW DIST
[4]  
[Anonymous], 2011, NDSS
[5]  
Arzt S., 2014, P 35 ANN ACM SIGPLAN
[6]  
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018
[7]  
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[8]  
Enck W, 2011, P USENIX
[9]  
Enck W, 2011, P USENIX OSDI
[10]  
Felt A. P., 2011, 20 USENIX SEC S