DocumentCode :
186610
Title :
Curtailing privilege escalation attacks over asynchronous channels on Android
Author :
Mollus, Katharina ; Westhoff, Dirk ; Markmann, Tobias
Author_Institution :
Hochschule Furtwangen Univ., Furtwangen, Germany
fYear :
2014
fDate :
4-6 June 2014
Firstpage :
87
Lastpage :
94
Abstract :
Recently we presented QuantDroid [7], a quantitative approach towards mitigating privilege escalation attacks on Android. By monitoring all synchronous IPC via overt channels on-the-fly, a so called flow-graph service detects an abnormal amount of traffic exchanged between DVMs running different Apps to indicate a potential horizontal privilege escalation attack. However, although certainly a valuable first step, our initial QuantDroid approach fails when dealing with asynchronous IPC via persistent storage containers on the Android system. To also address this issue, in this work we extend QuantDroid to QuantDroid++ by providing i) a central storage of taints when operating on system-internal databases of Android, ii) an extension of the SQL cursor object to preserve taints and link requested data with such taints, and, finally iii) an inspection of the information flow with such newly available taints for all relevant database operations.
Keywords :
Android (operating system); SQL; security of data; Android system; DVM; QuantDroid; asynchronous channels; flow-graph service; privilege escalation attacks; synchronous IPC; system-internal databases; the SQL cursor object; Androids; Databases; Humanoid robots; Monitoring; Permission; Smart phones; Android; Horizontal Privilege Escalation; IPC;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovations for Community Services (I4CS), 2014 14th International Conference on
Conference_Location :
Reims
Type :
conf
DOI :
10.1109/I4CS.2014.6860558
Filename :
6860558
Link To Document :
بازگشت