DocumentCode :
181987
Title :
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android
Author :
Rasthofer, Siegfried ; Arzt, Steven ; Lovat, Enrico ; Bodden, Eric
fYear :
2014
fDate :
8-12 Sept. 2014
Firstpage :
40
Lastpage :
49
Abstract :
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data such as contacts, photos, and e-mails. Sensors provide access to the phone´s physical location, and can record audio and video. While this is convenient for many applications, it also makes smartphones a worthwhile target for attackers providing malicious applications. Current approaches to runtime enforcement try to mitigate unauthorized leaks of confidential data. However, they are often capable of enforcing only a very limited set of policies, like preventing data leaks only within single components or monitoring access only to specific sensitive system resources. In this work, we present Droid Force, an approach for enforcing complex, data-centric, system-wide policies on Android applications. Droid Force allows users to specify fine-grained constraints on how and when which data may be processed on their phones, regardless of whether the malicious behavior is distributed over different colluding components or even applications. Policies can be dynamically exchanged at runtime and no modifications to the operating system nor root access to the phone are required. Droid Force works purely on the application level. It provides a centralized policy decision point as a dedicated Android application and it instruments a decentralized policy enforcement point into every target application. Analyzing and instrumenting an application takes in total less than a minute and secured applications exhibit no noticeable slowdown in practice.
Keywords :
Android (operating system); authorisation; data privacy; smart phones; Android application; Android applications; DROIDFORCE; access monitoring; application level; centralized policy decision point; colluding components; complex data-centric system-wide policies; confidential data; decentralized policy enforcement point; fine-grained constraints; malicious applications; malicious behavior; operating system; phone physical location; privacy-sensitive data; sensitive system resources; smartphones; unauthorized leaks; Androids; Instruments; Internet; Runtime; Security; Servers; Smart phones; Android; Data Flow; Data-Centric; Enforcement; Policy; System-Wide;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
Conference_Location :
Fribourg
Type :
conf
DOI :
10.1109/ARES.2014.13
Filename :
6980262
Link To Document :
بازگشت