A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.

Slides:



Advertisements
Similar presentations
Presented By Abhishek Singh Computer Science Department Kent state University WILLIAM ENCK, MACHIGAR ONGTANG, AND PATRICK MCDANIEL.
Advertisements

Aurasium: Practical Policy Enforcement for Android Applications By Yaoqi USENIX Security Symposium 2012.
An Evaluation of the Google Chrome Extension Security Architecture
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID David Barrera, H. Güne¸s Kayacık, P.C. van Oorschot,
DEPARTMENT OF COMPUTER ENGINEERING
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Google Android as a mobile development platform T Internet Technologies for Mobile Computing Olli Mäkinen.
Figure 1.1 Interaction between applications and the operating system.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Android Declassification Infrastructure Matan David Yuval Evron Project Advisor: Roei Schuster 1.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
박 종 혁 컴퓨터 보안 및 운영체제 연구실 MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications,
Introduction to Android Swapnil Pathak Advanced Malware Analysis Training Series.
Detecting and Preventing Privilege- Escalation on Android Jiaojiao Fu 1.
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Authors: William Enck The Pennsylvania State University Peter Gilbert Duke University Byung-Gon Chun Intel Labs Landon P. Cox Duke University Jaeyeon Jung.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
Permission Evolution in the Android Ecosystem Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Self-organizing Maps Kevin Pang. Goal Research SOMs Research SOMs Create an introductory tutorial on the algorithm Create an introductory tutorial on.
CSE 548 Advanced Computer Network Security Document Search in MobiCloud using Hadoop Framework Sayan Cole Jaya Chakladar Group No: 1.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Wireless and Mobile Security
Android Permissions Demystified
VMM Based Rootkit Detection on Android
NTHU CS ISLAB 國立清華大學 資訊工程研究所 資訊安全實驗室 Semantically Rich Application- Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Android and IOS Permissions Why are they here and what do they want from me?
Accelerometer based motion gestures for mobile devices Presented by – Neel Parikh Advisor Committee members Dr. Chris Pollett Dr. Robert Chun Dr. Mark.
The Ingredients of Android Applications. A simple application in a process In a classical programming environment, the OS would load the program code.
Some Great Open Source Intrusion Detection Systems (IDSs)
Presented by: Saurabh Kumar Sinha (MRT07UGBIT 186) IT VII Semester, Shobhit University Meerut.
Android Application -Architecture.
Android App Permission Manager
More Security and Programming Language Work on SmartPhones
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Advanced OS Topics Mobile OS and Distributed Systems Android OS
Visit for more Learning Resources
Understanding Android Security
Android Access Control
Android System Security
Architecture of Android
ANDROID AN OPEN HANDSET ALLIANCE PROJECT
Android.
Software Applications for end-users
Trends in my profession, Information Technology
CA16R405 - Mobile Application Development (Theory)
CMPE419 Mobile Application Development
CS-3013 Operating Systems Hugh C. Lauer
SOFTWARE TECHNOLOGIES
Android Introduction Platform Mihail L. Sichitiu.
Understanding Android Security
CMPE419 Mobile Application Development
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Chapter 10. Mobile Device Security
Android Access Control
Presentation transcript:

A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Introduction (Keywords)

Introduction  Permission-Based Security Models  Google’s Android OS  Google Chrome’s extension system In contact, Firefox extensions Run all extension code with same OS-level privileges as the browser itself  Blackberry OS Blackberry APIs with control access Reading phone logs, modifying system setting

Introduction (Android OS)  Android uses ACLs extensively to mediate inter- process communication and to control access to special functionality on the devices  Text messages, vibrator, GPS receiver.  Inter-process Communication (IPC) Technique communication between at lease two process  Advantages Prevent malware Inform user what applications are capable of doing once installed

Introduction (Main Objectives)  Empirical analysis  Objectives Investigate how the permission-based system in Android is used in practice Identify the strengths and limitations of the current implementation  Android applications  80,000 apps, at July 2010  Developed by large software companies and hobbyist  Not controlled as tightly as other mobile application stores  More variety in terms of requested permissions

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Related Work  [1] Enck et al. describe the design and implementation of a framework to detect potentially malicious applications based on permissions requested by Android applications.  [2] Barth et al. analyzed 25 browser extensions for Firefox and identified that 78% are give more privileges than necessary [1] W. Enck, M. Ongtang, and P. D. McDaniel. On Lightweight Mobile Phone Application Certification. In E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 235–245. ACM, [2] A. Barth, A. P. Felt, P. Saxena, and A. Boodman. Protecting Browsers from Extension Vulnerabilities. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS 2010).

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Android Permission Model  Android Applications are written in Java syntax and each run in a custom virtual machine known as Dalvik.  Any third party application can define new Functionality. (self-defined)  Every application written for the Android platform must include an XML-formatted file named “AndroidManifest.xml”  Permissions are enforced by Android at runtime, but must be accepted by the user at install time.

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Dataset

Dataset (Analysis)  Duplicate permission error  Request permission that do not exist  E.g. Txeet app Wrong: a.p.ACCESS_COURSE_LOCATION Real: a.p.ACCESS_COARSE_LOCATION  Signature Permissions  E.g. a.p.BRICK

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Self-Organizing Maps (SOM)  SOM is a type of neural network that is trained using unsupervised learning to produce a low- dimensional, relational view of a high complex dataset.  Characteristics:  SOM provides a 2-dimensional visualization of the high dimensional data  The component analysis of SOM can identify correlation between permissions.

Self-Organizing Maps (SOM)  The Training algorithm can be summarized in four basic step  1) initializes the SOM before training.  2) determines the best matching neuron, which is the shortest Euclidean distance to the input pattern  3) involves adjusting the best matching neuron and its neighbors so that the region surrounding the best matching neuron become closer to the input pattern.  4) repeat steps 2 – 3 until the convergence criterion is satisfied.

Self-Organizing Maps (SOM)

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Component Plane Analysis Internet Access_coarse_location Vibrate Write_contacts

Component Plane Analysis a.p.INTERNET Theme Productivity

Component Plane Analysis Travel, shopping, communication, and lifestyle

Outline  Introduction  Related Work  Android Permission Model  Dataset  Self-Organizing Maps (SOM)  Component Plane Analysis  Conclusion & Discussion

Conclusion & Discussion  A small subset of the permissions are used very frequently where a large subset of permissions were used be very few applications.  Finer-grained permissions vs. Complexity  Possible enhancement to Android  Hierarchy a.p.SEND_SMS, a.p.WRITE_SMS  a.p.SMS.* a.p.INTERNET  a.p.INTERNET.ADVERTISING(*.admob.com)  Grouping self-defined permissions