FLEXDROID: Enforcing In-App Privilege Separation in Android

被引:28
作者
Seo, Jaebaek [1 ]
Kim, Daehyeok [1 ]
Cho, Donghyun [1 ]
Kim, Taesoo [2 ]
Shin, Insik [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
来源
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) | 2016年
关键词
D O I
10.14722/ndss.2016.23485
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications are increasingly integrating third-party libraries to provide various features, such as advertising, analytics, social networking, and more. Unfortunately, such integration with third-party libraries comes with the cost of potential privacy violations of users, because Android always grants a full set of permissions to third-party libraries as their host applications. Unintended accesses to users' private data are underestimated threats to users' privacy, as complex and often obfuscated third-party libraries make it hard for application developers to estimate the correct behaviors of third-party libraries. More critically, a wide adoption of native code (JNI) and dynamic code executions such as Java reflection or dynamic code reloading, makes it even harder to apply state-of-the-art security analysis. In this work, we propose FLEXDROID, a new Android security model and isolation mechanism, that provides dynamic, fine-grained access control for third-party libraries. With FLEXDROID, application developers not only can gain a full control of third-party libraries (e.g., which permissions to grant or not), but also can specify how to make them behave after detecting a privacy violation (e.g., providing a mock user's information or kill). To achieve such goals, we define a new notion of principals for third-party libraries, and develop a novel security mechanism, called inter-process stack inspection that is effective to JNI as well as dynamic code execution. Our usability study shows that developers can easily adopt FLEXDROID's policy to their existing applications. Finally, our evaluation shows that FLEXDROID can effectively restrict the permissions of third-party libraries with negligible overheads.
引用
收藏
页数:15
相关论文
共 29 条
[1]  
[Anonymous], 2012, NDSS
[2]  
[Anonymous], 2014, P 2014 ACM C SECURIT, DOI DOI 10.1145/2627393
[3]  
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[4]  
[Anonymous], 2012, Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, Berkeley, CA, USA
[5]  
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[6]  
Bhoraskar R, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1021
[7]  
Book T., 2013, ARXIV PREPRINT ARXIV
[8]  
Bugiel Sven., 2011, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
[9]   MAdFraud: Investigating Ad Fraud in Android Applications [J].
Crussell, Jonathan ;
Stevens, Ryan ;
Chen, Hao .
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2014, :123-134
[10]  
Dietz M, 2011, USENIX SEC S, P24