Realizing Software Vault on Android Through Information-Flow Control

被引:0
|
作者
Shyamasundar, R. K. [1 ]
Kumar, N. V. Narendra [1 ]
Teltumde, Priyanka [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Bombay, Maharashtra, India
关键词
Secure execution environment; Information-flow control (IFC); Android;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several approaches to protect data and code, and ensure execution in a secure environment without getting infected from malwares, such as isolation, sandboxing, trust-based execution, application oriented access control have been proposed. In recent times, hardware-based solutions like ARM TrustZone and Intel SGX Enclave have been introduced to protect code and data from being infected or modified from outside the designated "secure" zone. While the hardware-based approaches have a distinct advantage, they have disadvantages in realizing Multi-Level Secure (MLS) systems, as they need to communicate via a central agent; further, a software vault would provide a good alternative when a system (like smartphone) is used/owned by a single person. In this paper, we describe a general approach for the creation of a software vault to preserve integrity and confidentiality of the information and computation end-to-end while supporting inter-communication among different components. This realizes an efficient interacting system that is secure and as good as the system using the hardware-based solutions. Our solution is through dynamic labelling using the recent information flow models for decentralized systems. We illustrate the application of our technique for building a runtime monitor for the Android environment, and demonstrate its characteristic properties by realizing a secure banking application. The solution guarantees end-to-end preservation of confidentiality & integrity, and allowing interactions among distributed components but still preserving the hardness of penetration from malware. We believe that our software vault will have extensive applications in utility computing that demands inter-communication between clouds.
引用
收藏
页码:1007 / 1014
页数:8
相关论文
共 50 条
  • [1] Information-Flow Analysis of Android Applications in DroidSafe
    Gordon, Michael, I
    Kim, Deokhwan
    Perkins, Jeff
    Gilham, Limei
    Nguyen Nguyen
    Rinard, Martin
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [2] Analyzing Protocol Security Through Information-Flow Control
    Kumar, N. V. Narendra
    Shyamasundar, R. K.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, (ICDCIT 2017), 2017, 10109 : 159 - 171
  • [3] SOFTWARE STRUCTURE METRICS BASED ON INFORMATION-FLOW
    HENRY, S
    KAFURA, D
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1981, 7 (05) : 510 - 518
  • [4] On Formalizing Information-Flow Control Libraries
    Vassena, Marco
    Russo, Alejandro
    [J]. PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16), 2016, : 15 - 28
  • [5] DESIGN OF INFORMATION-FLOW FOR PRODUCTION CONTROL
    BENDEICH, E
    LANG, F
    [J]. WERKSTATTSTECHNIK ZEITSCHRIFT FUR INDUSTRIELLE FERTIGUNG, 1974, 64 (11): : 682 - 686
  • [6] Information-Flow Control with Fading Labels
    Bedford, Andrew
    [J]. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 388 - 390
  • [7] INFORMATION-FLOW
    不详
    [J]. NATION, 1981, 233 (04) : 101 - 102
  • [8] A verified static information-flow control library
    Vassena, Marco
    Russo, Alejandro
    Buiras, Pablo
    Waye, Lucas
    [J]. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2018, 95 : 148 - 180
  • [9] CONTROL OF INFORMATION-FLOW IN COMPUTER-NETWORKS
    LAZAREV, VG
    [J]. ENGINEERING CYBERNETICS, 1983, 21 (05): : 67 - 78
  • [10] IDENTIFICATIONAL CONTROL OF INFORMATION-FLOW IN NETWORK STRUCTURES
    FIALKOWSKI, K
    JASTRZEBSKI, S
    [J]. INTERNATIONAL FORUM ON INFORMATION AND DOCUMENTATION, 1978, 3 (01): : 18 - 21