The Android Platform Security Model

被引:17
|
作者
Mayrhofer, Rene [1 ,2 ]
Vander Stoep, Jeffrey [1 ]
Brubaker, Chad [1 ]
Kralevich, Nick [1 ]
机构
[1] Google, Mountain View, CA 94043 USA
[2] Johannes Kepler Univ Linz, Linz, Austria
关键词
Android; security; operating system; informal model;
D O I
10.1145/3448609
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This article aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Design and Implementation of the smart home security control system based on the Android platform
    Zhang, Yonghong
    Huang, Rui
    [J]. MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 3120 - 3124
  • [22] A Proposal for Addressing Security Issues Related to Dynamic Code Loading on Android Platform
    Kelec, Aleksandar
    Djuric, Zoran
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2020, 35 (04): : 271 - 282
  • [23] Static binary analysis of mobile applications for the android platform, according to the requirements of information security
    Aleksandrov Y.A.
    Safin L.K.
    Troshina K.N.
    Chernov A.V.
    [J]. Moscow University Computational Mathematics and Cybernetics, 2016, 40 (3) : 141 - 146
  • [24] A SECURITY ASSESSMENT METHOD FOR ANDROID APPLICATIONS BASED ON PERMISSION MODEL
    Jiang, Danyang
    Fu, Xiangling
    Song, Maoqiang
    Cui, Yidong
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 701 - 705
  • [25] An empirical study of collaborative model and its security risk in Android
    Jha, Ajay Kumar
    Lee, Woo Jin
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 550 - 562
  • [26] Security Controls for Android
    Garcia Vargas, Ruben Jonathan
    Galeana Huerta, Ramon
    Aguirre Anaya, Eleazar
    Moreno Hernandez, Alba Felix
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 212 - 216
  • [27] Understanding Android Security
    Robinson, Gregor
    Weir, George R. S.
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 189 - 199
  • [28] Security Smells in Android
    Ghafari, Mohammad
    Gadient, Pascal
    Nierstrasz, Oscar
    [J]. 2017 IEEE 17TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2017, : 121 - 130
  • [29] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [30] Understanding Android Security
    Enck, William
    Ongtang, Machigair
    McDaniel, Patrick
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 50 - 57