Leave Me Alone: App- level Protection Against Runtime Information Gathering on Android NAN ZHANG, KAN YUAN, MUHAMMAD NAVEED†, XIAOYONG ZHOU AND XIAOFENG.

Slides:



Advertisements
Similar presentations
Win the Cyberwar on Mobile Banking and Payments
Advertisements

Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
© Leaf Solutions, LLC. All Rights Reserved What’s New in Everett Microsoft.Net V1.1.
Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
MOOC on M4D 2013 I NTRODUCTION TO THE A NDROID P LATFORM Ashish Agrawal Indian Institute of Technology Kanpur.
Android Security. N-Degree of Separation Applications can be thought as composed by Main Functionality Several Non-functional Concerns Security is a non-functional.
An Evaluation of the Google Chrome Extension Security Architecture
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Exokernel: An Operating System Architecture for Application-Level Resource Management Dawson R. Engler, M. Frans Kaashoek, and James O’Toole Jr. M.I.T.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Case study 2 Android – Mobile OS.
William Enck, Machigar Ongtang, and Patrick McDaniel.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Presentation By Deepak Katta
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Sophos Mobile Security
Introduction Our Topic: Mobile Security Why is mobile security important?
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
IC3 Chapter 8 Computer Fundamentals
박 종 혁 컴퓨터 보안 및 운영체제 연구실 MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications,
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating Luyi Xing 1, Xiaorui Pan 1, Rui Wang 2, Kan Yuan 1, and XiaoFeng.
Leave Me Alone: App-level Protection Against
AppShield: A Virtual File System in Enterprise Mobility Management Zhengyang Qu 1 Northwestern University, IL, US,
Android Security Auditing Slides and projects at samsclass.info.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
IViewer v3.5 release meeting 2014/01/23. New features in iViewer v3.5 1) Support live view of Crystal v2.0 2) Favorite view 3) New Event list button 4)
Virtual Workspaces Kate Keahey Argonne National Laboratory.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Wireless and Mobile Security
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Multi-Mouse A SIMPLE IDEA ILLUSTRATION. My personal work environment.
Dynamic Vetting Android Applications for Privilege-escalation Risks Jiaojiao Fu 1.
CRePE: Context-Related Policy Enforcement for Android Mauro Conti, Vu Thien Nga Nguyen and Bruno Crispo Proceedings of the 13 th International Conference.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
Android and IOS Permissions Why are they here and what do they want from me?
AppAudit Effective Real-time Android Application Auditing Andrew Jeong
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Literature by S. Demetriou et al. Presented.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
ANDROID ACCESS CONTROL Presented by: Justin Williams Masters of Computer Science Candidate.
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Understanding Android Security
Android System Security
Architecture of Android
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management Zhengyang Qu1, Guanyu Guo2, Zhengyue Shao2, Vaibhav Rastogi3,
Who owns your phone? Who feels that they have the right to use your phone for their purposes or on your behalf?
Android Application Permission Manager
What Mobile Ads Know About Mobile Users
Suwen Zhu, Long Lu, Kapil Singh
“Location Privacy Protection for Smartphone Users”
Shielding applications from an untrusted cloud with Haven
Understanding Android Security
Contents Introduction Motivation Objectives
Presentation transcript:

Leave Me Alone: App- level Protection Against Runtime Information Gathering on Android NAN ZHANG, KAN YUAN, MUHAMMAD NAVEED†, XIAOYONG ZHOU AND XIAOFENG WANG INDIANA UNIVERSITY, BLOOMINGTON

INTRODUCTION What is the Problem ? Threat to the mobile users – RIG App with the RECORD_AUDIO permission/ App with no permission RIG threats existence in popular IOT home security devices Eg: Belkin Netcam, and Nest protect Current security model of Android New Approach – App Guardian Basic concept of App Guardian

CHALLENGES OS-level solution is often complicated and painful as the manufactures have to customize to various devices Pushing the problem to the app developers is by no means a good idea. Eg, It cannot stop the recording of other app or adding noise to channel increases performance overhead. Conventional solutions to the problem rely on modifying either the Android OS or the apps under the threat. But, this creates the compatibility issues

What’s unique ? This App level protection Guard not touching the OS or the App in protection at all. Strategy to identify the suspicious apps by inspecting app’s permissions and behaviours Basic Concept in a nutshell: Pauses all background apps capable causing damage No matter what: RIG attack will be failed

Architecture of Guardian

App Restart Vs Switch

Lifecycle of Guardian App

How to protect the App Guardian itself ? startForeground KILL_BACKGROUND_PROCESSES System on low memory largeHeap = "true“ restart intent

EVALUATION Guardian evaluated over 475 most popular Android apps in 27 categories in the Google store 1.68% of the apps which has impact on the user information needed to be closed All types of RIG attacks that includes audio recording, Bluetooth misbonding have been defeated by this approach Performance: performance cost is as low as 5% of CPU time and 40 MB memory

EVALUATION

My Analysis Lightweight response and no false alarms App with no system privileges could break Android’s application sandbox and circumvent an app-level protection. App guardian protected itself. Then why not malicious apps use the same trick ? This proposed solution is based on main assumption that most apps in market does not follow the trick of App guardian and this may lead to the FAILURE of this app. What if the malicious apps are released in the name of security apps but not actually securing the apps instead stealing data. These researchers have taken initiative to address the attacks in side channel

My Analysis What if the user wants to record an important call, this Guardian in mobile restricts this functionality due to the protection against RIG attack. This simple mechanism of stopping and resuming the background apps focuses only on the issue of audio recording while using phone app, not considering other privacy leakages through the messages or file transfer through the Bluetooth. The guardian app does not quit even if the mobile runs on low memory. This can be considered as an advantage as well as disadvantage of this app. In general, there is no module included in this proposed system to differentiate the danger background processes from the legitimate one except for the case of audio record. If the Android OS takes an initiative to build the protection wall in the side channels, these attacks will not exist anymore so this research do not have a scope in future at all.

FUTURE WORK

Thank You