The Android Platform Security Model

被引:25
作者
Mayrhofer, Rene [1 ,2 ]
Vander Stoep, Jeffrey [1 ]
Brubaker, Chad [1 ]
Kralevich, Nick [1 ]
机构
[1] Google, Mountain View, CA 94043 USA
[2] Johannes Kepler Univ Linz, Linz, Austria
关键词
Android; security; operating system; informal model;
D O I
10.1145/3448609
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This article aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model.
引用
收藏
页数:35
相关论文
共 139 条
[1]   SoK: Lessons Learned From Android Security Research For Appified Software Platforms [J].
Acar, Yasemin ;
Backes, Michael ;
Bugiel, Sven ;
Fahl, Sascha ;
McDaniel, Patrick ;
Smith, Matthew .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :433-451
[2]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[3]  
Ahn, 2018, WE FOUGHT BAD APPS M
[4]   From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It [J].
Anderson, Bonnie Brinton ;
Vance, Anthony ;
Kirwan, C. Brock ;
Jenkins, Jeffrey L. ;
Eargle, David .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2016, 33 (03) :713-743
[5]  
[Anonymous], 2018, Web authentication: An API for accessing public key credentials level 1
[6]  
[Anonymous], 2013, P 20 ACM C COMP COMM, DOI [10.1145/2508859.2516655, DOI 10.1145/2508859.2516655]
[7]  
[Anonymous], 2014, Modern Operating Systems
[8]  
[Anonymous], 2018, CVE20189341
[9]  
[Anonymous], 1975, MTR2997 MITRE CORP
[10]  
[Anonymous], 2020, 180135 ISO