Abstract | ||
---|---|---|
As the number of smart devices continues to grow dramatically, programmes and data handled by such smart devices have become the primary targets of hackers and malwares. ARM-Android is the most widespread platform for smart devices. Access to privacy-and security-relevant parts of the API is controlled by the corresponding permission in a manifest. However, while requesting access to permissions, these applications may offer opportunities to malicious codes to gain access to other inaccessible resources which will cause a series of security issues. Recently, many researchers focus on the permission-based mechanism which restricts accesses of users and applications to critical resources on an ARM-Android device. Few works among permission analysis, however, pay attention to the prevention of permission leakage on both hardware and software frameworks. In this paper we tackle the challenge of providing our permission-based security architecture on ARM-Android platform. We propose an usage and access control model and an effective method of preventing permission leakage based on ARM TrustZone security extension. In contrast to previous work, the proposed security architecture provides a flexible mandatory access control on Android middleware, Linux kernel, and hardware layers. The evaluation results demonstrate the effectiveness in mitigating permission leakage vulnerabilities. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/CIT.2016.14 | 2016 IEEE International Conference on Computer and Information Technology (CIT) |
Keywords | Field | DocType |
permission management enhancement,ARM-Android platform,smart devices,data handling,malwares,security-relevant API parts,privacy-relevant API parts,malicious codes,inaccessible resources,permission-based mechanism,ARM-Android device,permission analysis,software frameworks,hardware frameworks,permission-based security architecture,access control model,permission leakage,ARM TrustZone security extension,security architecture,flexible mandatory access control,Android middleware,Linux kernel,hardware layers,permission leakage vulnerabilities | Middleware,Permission,Android (operating system),Computer security,Computer science,Computer network,Mandatory access control,Access control,Enterprise information security architecture,Operating system,Software framework,Linux kernel | Conference |
ISBN | Citations | PageRank |
978-1-5090-4315-6 | 0 | 0.34 |
References | Authors | |
18 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Rui Chang | 1 | 389 | 39.86 |
Liehui Jiang | 2 | 15 | 6.94 |
Wenzhi Chen | 3 | 141 | 28.65 |
Hong-qi He | 4 | 2 | 2.20 |
Shuiqiao Yang | 5 | 6 | 2.55 |