Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel Department of Computer Science and Engineering The Pennsylvania State University ACSCA.

Slides:



Advertisements
Similar presentations
Android Application Development A Tutorial Driven Course.
Advertisements

Google Android Introduction to Mobile Computing. Android is part of the build a better phone process Open Handset Alliance produces Android Comprises.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Syracuse University, New York, USA
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
Android: An Open Software Platform for Mobile Devices
Policy Weaving for Mobile Devices Drew Davidson. Smartphone security is critical – 1200 to 1400 US Army troops to be equipped with Android smartphones.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core Patrick Michael Lin, Machigar Ongtang, Vikhyath.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID David Barrera, H. Güne¸s Kayacık, P.C. van Oorschot,
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Security of Mobile Applications Vitaly Shmatikov CS 6431.
Version # Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1999 by Carnegie.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Emerging Platform#4: Android Bina Ramamurthy.  Android is an Operating system.  Android is an emerging platform for mobile devices.  Initially developed.
Android Middleware Bo Pang
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Mobile Application Development with ANDROID Tejas Lagvankar UMBC 29 April 2009.
Mobile Application Development with ANDROID. Agenda Mobile Application Development (MAD) Intro to Android platform Platform architecture Application building.
About me Yichuan Wang Android Basics Credit goes to Google and UMBC.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications,
Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas.
Detecting and Preventing Privilege- Escalation on Android Jiaojiao Fu 1.
Authors: William Enck The Pennsylvania State University Peter Gilbert Duke University Byung-Gon Chun Intel Labs Landon P. Cox Duke University Jaeyeon Jung.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Software Architecture of Android Yaodong Bi, Ph.D. Department of Computing Sciences University of Scranton.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
APKInspector -Static Analysis of Android Applications Student: Yuan Tian Mentor: Cong Zheng Backup Mentor: Anthony Kara Jianwei 08/22/2012.
01. Introduction to Android Prof. Oum Saokosal Master of Engineering in Information Systems, South Korea
Permission Evolution in the Android Ecosystem Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Rajab Davudov. Agenda Eclipse, ADT and Android SDK APK file Fundamentals – Activity – Service – Content Provider – Broadcast Receiver – Intent Hello World.
Erika Chin Adrienne Porter Felt Kate Greenwood David Wagner University of California Berkeley MobiSys 2011.
Overview of Android Application Development
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
PORSCHA PORSCHA : POLICY ORIENTED SECURE CONTENT HANDLING IN ANDROID Machigar Ongtang, Kevin Butler, Patrick McDaniel Dhurakij Pundit University, University.
ANDROID L. Grewe Components  Java Standard Development Kit (JDK) (download) (latest version)  AndroidStudio.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
Android Security Extensions. Android Security Model Main objective is simplicity Users should not be bothered Does the user care? Most do not care…until.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Mobile Application Security on Android Originally presented by Jesse Burns at Black Hat
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Android Permissions Demystified
VMM Based Rootkit Detection on Android
Operating Systems Morrison / WellsCLB: A Comp Guide to IC 3 3E 1 Morrison / Wells.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
1 Android Workshop Platform Overview. 2 What is Android?  Android is a software stack for mobile devices that includes an operating system, middleware.
NTHU CS ISLAB 國立清華大學 資訊工程研究所 資訊安全實驗室 Semantically Rich Application- Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
ANDROID ACCESS CONTROL Presented by: Justin Williams Masters of Computer Science Candidate.
Workshop by T.Naveen sai kumar.
Android Application -Architecture.
More Security and Programming Language Work on SmartPhones
Understanding Android Security
Android System Security
Application Development A Tutorial Driven Course
Understanding Android Security
Module 8: Implementing Group Policy
Presentation transcript:

Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel Department of Computer Science and Engineering The Pennsylvania State University ACSCA /12/8 1 Advanced Defense Laboratory

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 2 Advanced Defense Laboratory

Introduction  Applications on mobile platform  Apple’s App Store Apple’s App Store  Android’s Market Android’s Market  BlackBerry App World BlackBerry App World  Android Security  Using permission label 2009/12/8Advanced Defense Laboratory 3

Introduction (cont.)  In Manifest.xml:  You can not use the functions which are not in your application permission 2009/12/8Advanced Defense Laboratory 4

Introduction (cont.)  Users are impossible to make good choices about the application permissions  The Android system protects the phone from malicious applications, but provides severely limited infrastructure for applications to protect themselves 2009/12/8Advanced Defense Laboratory 5

Introduction (cont.)  Android Security Framework  Permission Assignment Policy  Interface Exposure Policy  Interface Use Policy  Secure Application INTeraction (Saint) framework  Installation-time Policy  Runtime Policy 2009/12/8Advanced Defense Laboratory 6

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 7 Advanced Defense Laboratory

Smartphone Application Security  Example: 2009/12/8Advanced Defense Laboratory 8 PeronalShopper only trust Secure Payment and Trust Checkout. Password vault app contain bugs in v1.1. So application needs the new version. If Ledger has the permission to access Internet, it might leak transaction info. PersonalShopper can get location info only if it holds the permissions.

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 9 Advanced Defense Laboratory

Android /12/8Advanced Defense Laboratory 10

Android (cont.)  Applications are ostensibly isolated  Android IPC : Binder and Intent Android IPC  ioctl driver  Intent Filter: 2009/12/8Advanced Defense Laboratory 11

Android (cont.)  Activity  Display on screen 2009/12/8Advanced Defense Laboratory 12

Android (cont.)  Service  Background process 2009/12/8Advanced Defense Laboratory 13

Android (cont.)  Broadcast Receiver  Asynchronous event notification 2009/12/8Advanced Defense Laboratory 14

Android (cont.)  Content Provider  Share data between applications  Do not use Intents  Use URI (Uniform Resource Identifier) 2009/12/8Advanced Defense Laboratory 15

Android (cont.)  Permission label in Android Permission label in Android  Normal  Dangerous  Signature  signatureOrSystem  Developers can define permission labels to access their interface  But developers indirectly influence security 2009/12/8Advanced Defense Laboratory 16

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 17 Advanced Defense Laboratory

Application Policies  Policy Tree:  Double-stoke boxes is supported by Android 2009/12/8Advanced Defense Laboratory 18

Application Policies (cont.)  Signature-based policy (1.2)  Define set of except signatures  Configuration-based policy (1.3)  E.g., Application version and the set of request permissions 2009/12/8Advanced Defense Laboratory 19

Application Policies (cont.)  Signature-based policy (2.2)  Configuration-based policy (2.3)  Phone Context-based Policy (2.4) 2009/12/8Advanced Defense Laboratory 20

Application Policies (cont.)  Install-time Policy Example  com.abc.lbs with “QueryByLocation” service  Developer Permission: com.abc.perm.getloc  Permission: ACCESS_LOCATION  Runtime Policy Example  com.ok.shopper wants to check the payment application  Signature checks 2009/12/8Advanced Defense Laboratory 21

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 22 Advanced Defense Laboratory

SAINT Policy 2009/12/8Advanced Defense Laboratory 23 Install-Time Run-Time

SAINT Policy (cont.)  Install-time Policy Example 2009/12/8Advanced Defense Laboratory 24

SAINT Policy (cont.)  Runtime Policy  Access policy  Identify the caller’s security requirements  Expose policy  Identify the callee’s security requirements  Saint is a “conjunctional default allow policy” 2009/12/8Advanced Defense Laboratory 25

SAINT Policy (cont.)  Runtime Policy Example 2009/12/8Advanced Defense Laboratory 26

SAINT Policy (cont.)  Administrative Policy  May users override the system/application policies?  Operational Policy 2009/12/8Advanced Defense Laboratory 27

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 28 Advanced Defense Laboratory

SAINT Architecture  Saint Installer  PackageParser / PackageManager  Insert each policy into AppPolicy provider only if its permission label is declared by the application 2009/12/8Advanced Defense Laboratory 29

SAINT Architecture (cont.)  Saint Mediator 2009/12/8Advanced Defense Laboratory 30

SAINT Architecture (cont.)  AppPolicy Provider  SQLite  verifyPermissionGrant API  insertApplicationPolicy API  FrameworkPolicyManager  Only FrameworkPolicyManager can update AppPolicy provider 2009/12/8Advanced Defense Laboratory 31

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 32 Advanced Defense Laboratory

Related Work  Kirin  Enforce install policies  Application Security Framework by OMTP  Certificate-based mechanism  Symbian  Symbian-signed 2009/12/8Advanced Defense Laboratory 33

Related Work (cont.)  Linux Security Module (LSM) Framework  Isolation  SELinux on OpenMoko  Rao et al.  MAC system  Windows Mobile.Net  Bind each application to a behavioral profile enforced at runtime 2009/12/8Advanced Defense Laboratory 34

Outline IIntroduction SSmartphone Application Security AAndroid AApplication Policies SSAINT Policy SSAINT Architecture RRelated Work CConclusion 2009/12/8 35 Advanced Defense Laboratory

Conclusion  Saint framework  Install-time and runtime policy enforcement 2009/12/8Advanced Defense Laboratory 36