A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID David Barrera, H. Güne¸s Kayacık, P.C. van Oorschot,

Slides:



Advertisements
Similar presentations
ASM: A Programmable Interface for Extending Android Security Research by: Stephan Heuser, Adwair Nadkarni, William Enck, Ahmad-Reza Sadeghi From NC State.
Advertisements

Aurasium: Practical Policy Enforcement for Android Applications By Yaoqi USENIX Security Symposium 2012.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
An Evaluation of the Google Chrome Extension Security Architecture
AndroidCompiler. Layout Motivation Literature Review AndroidCompiler Future Works.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
DEPARTMENT OF COMPUTER ENGINEERING
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
D-OSDi + Android Progress Presentation Xinyi Dong Long Qiu.
ANDROID™ OS Security A brief synopsis of the Android Operating System and its security. By Daniel Angelis.
Security of Mobile Applications Vitaly Shmatikov CS 6431.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
Android Middleware Bo Pang
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications,
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Byron Alleman Will Galloway Jesse McCall. Permission Based Security Model Users can only use features for which their permissions grant them access Abstracts.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Android Programming By Mohsen Biglari Android Programming, Part1: Introduction 1 Part1: Introduction By Mohsen Biglari.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Co-design Environment for Secure Embedded Systems Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute.
Android for Java Developers Denver Java Users Group Jan 11, Mike
ANDROID 응용 프로그래밍 과정 – 목차 - 안드로이드란 - 안드로이드가 만들어지게 된배경 - 안드로이드의 철학 - 안드로이드 환경설정 ( SDK download, eclipse plug-in 설정, 간단한 프로그램 실행 ) - 안드로이드 동작원리 - 안드로이드 핵심.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Wireless and Mobile Security
Dynamic Vetting Android Applications for Privilege-escalation Risks Jiaojiao Fu 1.
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
Lesson 1 1 LESSON 1 l Background information l Introduction to Java Introduction and a Taste of Java.
Design and Implementation MAC in Security Operating System CAI Yi, ZHENG Zhi-rong, SHEN Chang-xiang Presented By, Venkateshwarlu Jangili. 1.
 Can access all API’s made available by OS vendor.  SDK’s are platform-specific.  Each mobile OS comes with its own unique tools and GUI toolkit.
Analysis And Research Of System Security Based On.
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
By Adam Reimel. Outline Introduction Platform Architecture Future Conclusion.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
By: David Johnston, James Mataras, Jesse Pirnat, Daniel Sanchez, Eric Shaw, Sean Vazquez, Brad Warren Stevens Institute of Technology Department of Quantitative.
The Ingredients of Android Applications. A simple application in a process In a classical programming environment, the OS would load the program code.
Some Great Open Source Intrusion Detection Systems (IDSs)
Presented by: Saurabh Kumar Sinha (MRT07UGBIT 186) IT VII Semester, Shobhit University Meerut.
Computer System Structures
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Containers as a Service with Docker to Extend an Open Platform
More Security and Programming Language Work on SmartPhones
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Visit for more Learning Resources
Understanding Android Security
Android Access Control
Boxify: Full-fledged App Sandboxing for Stock Android
Architecture of Android
Android Runtime – Dalvik VM
chapter 6- Android Introduction
CMPE419 Mobile Application Development
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
A BRIEF INTRODUCTION TO UNIX OPERATING SYSTEM
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Understanding Android Security
Device Access Tomas Lukša.
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
CMPE419 Mobile Application Development
Chapter 3 Software.
Android Access Control
Presentation transcript:

A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID David Barrera, H. Güne¸s Kayacık, P.C. van Oorschot, Anil Somayaji Carleton University, Ottawa, ON, Canada ACM CCS(2010)

Agenda  Introduction  Access control systems  Permission-Based Security  Related Work  Android Permission Model  Self-Organizing Maps(SOM)  Result  Further Discussion&Conclusion

Introduction  Restrict actions on specific resources  Access control lists (ACLs)  permission-based security models  Empirical analysis  Objectives investigate how the permission-based system in Android is used in practice Identify the strengths and limitations of the current implementation

Introduction  Android uses ACLs extensively to mediate inter- process communication (IPC) and to control access to special functionality on the device  Advantages Prevent malware inform users what applications are capable of doing once installed  Contribution  a novel methodology for exploring and empirically analyzing permission-based models

 Access control lists allows a subject to perform an action on an object only if the subject has been assigned the necessary permissions.  More sophisticated ACL-based systems allow the specification of a complex policy to control more parameters of how an object can be accessed.  Each ACL only restricts access to one action. Access control systems

Permission-Based Security  Android requires that developers declare in a manifest a list of permissions which the user must accept prior to installing an application  Google Chrome web browser uses a permission- based architecture in its extension system  Blackberry OS enforces through signature validation that an application has been granted permissions to access the controlled APIs

Related Work  Enck et al. describe the design and implementation of a framework to detect potentially malicious applications based on permissions requested by Android applications  Barth et al. analyzed 25 browser extensions for Firefox and identified that 78% are given more privileges than necessary

Android Permission Model  Android Market  Android applications are written in Java syntax and each run in a custom virtual machine known as Dalvik  Any third party application can define new Functionality

Android Permission Model  Every application written for the Android platform must include an XML-formatted file named AndroidManifest.xml.  Permissions are enforced by Android at runtime, but must be accepted by the user at install time

Android Permission Model

Self-Organizing Maps(SOM)  SOM is a type of neural network algorithm, which employs unsupervised learning  Characteristics:  SOM provides a 2-dimensional visualization of the high dimensional data  the component analysis of SOM can identify correlation between permissions.

Self-Organizing Maps(SOM)    

Results  Effectively clustering the applications requesting similar permissions into the same neighborhood.  Winner-take-all  Applications from different categories can request similar sets of permissions

Results  a.p.INTERNET permission is requested by the majority of applications in our dataset (over 60%)

Results  The analysis of component planes can reveal correlations between permissions  a.p.INTERNET permission fails to provide sufficiently fine-grained control of the resources  Many permissions are requested by only a few applications.

Further Discussion&Conclusion  Having finer-grained permissions in a permission-based system enables users to have detailed control over what actions are allowed to take place  Enhancements:  Logical permission grouping → fine-grained hierarchical permission  Logically grouping all self-defined permissions under one category  Hope that the SOM-based methodology, including visualization, is of use to others exploring independent permission-based models