SecureDroid: An Android Security Framework Extension for Context-Aware Policy Enforcement

被引:0
作者
Arena, Valerio [1 ]
Catania, Vincenzo [1 ]
La Torre, Giuseppe [1 ]
Monteleone, Salvatore [1 ]
Ricciato, Fabio [2 ]
机构
[1] Univ Catania, DIEEI, I-95124 Catania, Italy
[2] Innovat & Ind Relat Telecom Italia SpA, Milan, Italy
来源
2013 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS) | 2013年
关键词
Android; Access Control; Security; Context; Policy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices became the main repository of personal data and source of user-generated contents as well as the principal controller of our social networked life. In this scenario, malicious applications try to take advantage of all the possibilities left open by users and operating systems. In this paper, we propose SecureDroid: an extension of the Android security framework able to enforce flexible and declarative security policies at run-time, providing a fine-grained access control system. In particular, we focus on context dependent policies that allow the user to specify the way in which applications work according to current context.
引用
收藏
页数:8
相关论文
共 10 条
[1]  
Benton K., 2013, 5 INT WORKSH SECURIT
[2]   An extensible XACML authorization decision engine for context aware applications [J].
Cheaito, Marwan ;
Laborde, Romain ;
Barrere, Francois ;
Benzekri, Abdelmalek .
JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, :377-382
[3]   CRePE: A System for Enforcing Fine-Grained Context-Related Policies on Android [J].
Conti, Mauro ;
Crispo, Bruno ;
Fernandes, Earlence ;
Zhauniarovich, Yury .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) :1426-1438
[4]  
Huabo Li, 2011, Proceedings of the 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC 2011), P529, DOI 10.1109/IMCCC.2011.137
[5]  
Loscocco P, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, P29
[6]  
Lyle J., 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY 2012, P37, DOI 10.1109/POLICY.2012.9
[7]  
Mohan A., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10, P37, DOI DOI 10.1145/1750389.1750395
[8]  
Nauman M., 2010, PROC 5 ACM S INF COM, P328, DOI DOI 10.1145/1755688.1755732
[9]   BYOD: Enabling the chaos [J].
Thomson, Gordon .
Network Security, 2012, 2012 (02) :5-8
[10]  
Yahyaoui H., 2010, 2010 Fifth International Conference on Digital Information Management (ICDIM 2010), P496, DOI 10.1109/ICDIM.2010.5664644