• DocumentCode
    1799774
  • Title

    Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones

  • Author

    Zhihui Han ; Liang Cheng ; Yang Zhang ; Shuke Zeng ; Yi Deng ; Xiaoshan Sun

  • Author_Institution
    Trusted Comput. & Inf. Assurance Lab., Inst. of Software, Beijing, China
  • fYear
    2014
  • fDate
    24-26 Sept. 2014
  • Firstpage
    432
  • Lastpage
    439
  • Abstract
    Android is a modern and popular software platform for smart phones. To manage information and features on smart phones, Android employs intent-based mechanism for inter-application or intra-application communication and provides a permission-based security model that requires each application to explicitly request permissions in its manifest file. However, misconfiguration defined in manifest files and that embedded in application code may result in vulnerabilities due to developer confusion and general misuse of the features provided by Android. In this paper, we propose a logic-programming-based approach to analyze smart phones and discover misconfiguration vulnerabilities in Android manifest file and application code. To enable misconfiguration vulnerability analysis and detection, we develop a static technique to extract security related information from application code, and employ logic predicates to describe various vulnerabilities. Based on this approach, we developed a tool called SADroid to systematically analyze and detect misconfiguration vulnerabilities in Android smart phones. Our results with two representative phones show that the inherent weakness of Android permission model and developers´ programming errors make Android vulnerable to some attacks.
  • Keywords
    logic programming; security of data; smart phones; Android manifest file; Android permission model; Android smartphones; SADroid; application code; intent-based mechanism; interapplication communication; intraapplication communication; logic predicates; logic-programming-based approach; misconfiguration vulnerability; misconfiguration vulnerability detection; permission-based security model; static technique; systematic analysis; Analytical models; Google; Java; Prototypes; Receivers; Security; Smart phones; Android smartphone; logic programming; misconfiguration vulnerability; static analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
  • Conference_Location
    Beijing
  • Type

    conf

  • DOI
    10.1109/TrustCom.2014.56
  • Filename
    7011279