Title | ||
---|---|---|
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android |
Abstract | ||
---|---|---|
Enterprise mobility management (EMM) solution is widely used to securely protect confidential information stored on an individual's smartphone, while increasing the efficiency because of BYOD policy. The application wrapping (Appwrapping) technology is one way to be applied EMM solutions, by modifying binary applications without the original source code. In the past, Appwrapping was performed to control permissions or APIs to protect privacy on Android. This method is applied collectively to the whole section, not a specific section of the app, so it is difficult to control the section (flow) desired by the user or the manager. In addition, system overhead can occur because the control is applied to the whole section of the app. In this paper, we propose a method to insert an additional security policy code at a certain interval position in the intermediate code of a binary app, so that it can be controlled at a specific interval rather than the whole interval of the app. The proposed method extracts and saves the security policy intermediate code and the related file in advance and then adds the security policy code to the specific method on the intermediate code of the specific activity acquired by decompiling the target app. Finally, the additional security policy code is modified to avoid errors caused by the additional code. We create an automation tool for performance verification, experiment with five commercial office apps, and confirm that the apps work properly with the added EMM security functions. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/ISSREW.2017.25 | 2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) |
Keywords | Field | DocType |
Appwrapping,EMM,mobile security | Enterprise mobility management,Android (operating system),Confidentiality,Computer science,Source code,Computer security,Usability,Information security,Real-time computing,Automation,Security policy,Operating system | Conference |
ISSN | ISBN | Citations |
2375-821X | 978-1-5386-2388-6 | 1 |
PageRank | References | Authors |
0.39 | 1 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sung-Hoon Lee | 1 | 6 | 2.51 |
Seung-Hyun Kim | 2 | 89 | 18.91 |
Soo-Hyung Kim | 3 | 191 | 49.03 |
Seung-Hun Hun Jin | 4 | 4 | 1.50 |