Towards Formal Analysis of the Permission-based Security Model for Android

被引:13
作者
Shin, Wook [1 ]
Kiyomoto, Shinsaku [1 ]
Fukushima, Kazuhide [1 ]
Tanaka, Toshiaki [1 ]
机构
[1] KDDI R&D Labs, Saitama, Japan
来源
ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS | 2009年
关键词
Android; permission; security; formal model; Coq;
D O I
10.1109/ICWMC.2009.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the source code of Android was released to the public, people have concerned about the security of the Android system. Whereas the insecurity of a system can be easily exaggerated even with few minor vulnerabilities, the security is not easily demonstrated. Formal methods have been favorably applied for the purpose of ensuring security in different contexts to attest whether the system meets the security goals or not by relying on mathematical proofs. In order to commence the security analysis of Android, we specify the permission mechanism for the system. We represent the system in terms of a state machine, elucidate the security needs, and show that the specified system is secure over the specified states and transitions. We expect that this work will provide the basis for assuring the security of the Android system. The specification and verification were carried out using the Coq proof assistant.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 1973, MITRE Technical Report 2547
[2]  
BEGUELIN SZ, 2006, 4 INT WORKSH FORM AS, P220
[3]  
Bertot Y., 2004, TEXT THEORET COMP S
[4]  
Bhargavan K, 2006, LECT NOTES COMPUT SC, V4184, P88
[5]   An overview of JML tools and applications [J].
Burdy L. ;
Cheon Y. ;
Cok D.R. ;
Ernst M.D. ;
Kiniry J.R. ;
Leavens G.T. ;
Leino K.R.M. ;
Poll E. .
International Journal on Software Tools for Technology Transfer, 2005, 7 (3) :212-232
[6]  
CRISTIA M, 2002, THESIS U REPUBLICA
[7]  
DANCHEV D, 2008, OPEN SOURCE SOFTWARE
[8]  
*GOOGL INC, 2009, WHAT IS ANDR
[9]  
*GOOGL INC, 2009, SEC PERM
[10]  
GREENBERG A, 2009, MORE SECURITY ANGST