SARRE: Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android

被引:15
作者
Li, Yongbo [1 ]
Yao, Fan [1 ]
Lan, Tian [1 ]
Venkataramani, Guru [1 ]
机构
[1] George Washington Univ, Dept Elect & Comp Engn, Washington, DC 20052 USA
基金
美国国家科学基金会;
关键词
Android privacy; rule recommendation; statistical analysis; path identification; rule enforcement; SYSTEM;
D O I
10.1109/TIFS.2016.2596141
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a semantics-aware rule recommendation and enforcement (SARRE) system for taming information leakage on Android. SARRE leverages statistical analysis and a novel application of minimum path cover algorithm to identify system event paths from dynamic runtime monitoring. Then, an online recommendation system is developed to automatically assign a fine-grained security rule to each event path, capitalizing on both known security rules and application semantic information. The proposed SARRE system is prototyped on Android devices and evaluated using real-world malware samples and popular apps from Google Play spanning multiple categories. Our results show that SARRE achieves 93.8% precision and 96.4% recall in identifying the event paths, compared with tainting technique. Also, the average difference between rule recommendation and manual configuration is less than 5%, validating the effectiveness of the automatic rule recommendation. It is also demonstrated that by enforcing the recommended security rules through a camouflage engine, SARRE can effectively prevent information leakage and enable fine-grained protection over private data with very small performance overhead.
引用
收藏
页码:2748 / 2762
页数:15
相关论文
共 47 条
[1]  
AAFER Y, 2013, L N INST COMP SCI SO, P86
[2]  
[Anonymous], 2013, NETWORK DISCTRIBUTED
[3]  
[Anonymous], 1994, P INT C VERY LARGE D
[4]  
[Anonymous], 2015, P 22 ANN NETW DISTR
[5]  
[Anonymous], 2013, P NDSS
[6]  
[Anonymous], 2001, WWW, DOI 10.1145/371920.372071
[7]  
[Anonymous], 2014, 11th USENIX symposium on networked systems design and implementation (NSDI 14)
[8]  
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[9]  
[Anonymous], 2013, P ANN INT C MOB SYST, DOI DOI 10.1145/2462456.2464460
[10]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices