DocumentCode
1799774
Title
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones
Author
Zhihui Han ; Liang Cheng ; Yang Zhang ; Shuke Zeng ; Yi Deng ; Xiaoshan Sun
Author_Institution
Trusted Comput. & Inf. Assurance Lab., Inst. of Software, Beijing, China
fYear
2014
fDate
24-26 Sept. 2014
Firstpage
432
Lastpage
439
Abstract
Android is a modern and popular software platform for smart phones. To manage information and features on smart phones, Android employs intent-based mechanism for inter-application or intra-application communication and provides a permission-based security model that requires each application to explicitly request permissions in its manifest file. However, misconfiguration defined in manifest files and that embedded in application code may result in vulnerabilities due to developer confusion and general misuse of the features provided by Android. In this paper, we propose a logic-programming-based approach to analyze smart phones and discover misconfiguration vulnerabilities in Android manifest file and application code. To enable misconfiguration vulnerability analysis and detection, we develop a static technique to extract security related information from application code, and employ logic predicates to describe various vulnerabilities. Based on this approach, we developed a tool called SADroid to systematically analyze and detect misconfiguration vulnerabilities in Android smart phones. Our results with two representative phones show that the inherent weakness of Android permission model and developers´ programming errors make Android vulnerable to some attacks.
Keywords
logic programming; security of data; smart phones; Android manifest file; Android permission model; Android smartphones; SADroid; application code; intent-based mechanism; interapplication communication; intraapplication communication; logic predicates; logic-programming-based approach; misconfiguration vulnerability; misconfiguration vulnerability detection; permission-based security model; static technique; systematic analysis; Analytical models; Google; Java; Prototypes; Receivers; Security; Smart phones; Android smartphone; logic programming; misconfiguration vulnerability; static analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location
Beijing
Type
conf
DOI
10.1109/TrustCom.2014.56
Filename
7011279
Link To Document