Signature-based Detection of Privilege-Escalation Attacks on Android

被引:0
|
作者
Niazi, Rafay Hassan [1 ]
Waseem, Tahir [1 ]
Shamsi, Jawwad Ahmed [2 ]
Khan, Muhammad Mubashir [3 ]
机构
[1] NED Univ Engn & Technol, Comp Informat Syst, Karachi, Pakistan
[2] FAST Natl Univ Comp & Emerging Sci, Dept Comp Sci, Karachi, Pakistan
[3] NED Univ Engn & Technol, Comp Sci & Informat Technol, Karachi, Pakistan
来源
2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS) | 2015年
关键词
Privilege Escalation; Operating System Security; Social Networks and Web Security; System Assurance; Malware; Monitoring; Security and Safety;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android has become a major player in smartphone software arena, thanks to the massively positive reception of Google Play by the developers and users alike. In general, Android applications follow a set of permissions, which are used for access control. However, through the privilege-escalation vulnerability, a malicious application can escalate itself and access an un-permitted resource. Consequently, serious security and safety exploits such as privacy violation, reverse-shell access to the device, and drive-by downloads may occur. We propose a flexible and efficient defense mechanism against such exploits. Our solution - SAndroid, is an extensible and a lightweight application. It provides enhanced safety and security against privilege escalation attacks through rapid detection. SAndroid is based on active monitoring and detection of malicious applications through tracking of system logs and malicious process signatures. The assurance of safety provided by SAndroid is confirmed through design, testing, and verification. SAndroid follows modular approach permitting high flexibility and efficiency. Through real experiments, we confirmed that SAndroid is an efficient and low cost solution having negligible false-positives. This paper describes the architecture and design of the SAndroid framework and provides details of our experiments.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 50 条
  • [1] Privilege Escalation Attacks on Android
    Davi, Lucas
    Dmitrienko, Alexandra
    Sadeghi, Ahmad-Reza
    Winandy, Marcel
    INFORMATION SECURITY, 2011, 6531 : 346 - +
  • [2] Security Identifier Randomization: A Method to Prevent Kernel Privilege-Escalation Attacks
    Wei, Lifeng
    Zuo, Yudan
    Ding, Yan
    Dong, Pan
    Huang, Chenlin
    Gao, Yuanming
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 838 - 842
  • [3] A taxonomy of privilege escalation attacks in Android applications
    Rangwala, Mohammed
    Zhang, Ping
    Zou, Xukai
    Li, Feng
    International Journal of Security and Networks, 2014, 9 (01) : 40 - 55
  • [4] Role behavior detection method of privilege escalation attacks for android applications
    Li H.
    Shen L.
    Ma C.
    Liu M.
    International Journal of Performability Engineering, 2019, 15 (06): : 1631 - 1641
  • [5] A Survey of Privilege Escalation Detection in Android
    Hutchinson, Shinelle
    Varol, Cihan
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 726 - 731
  • [6] Limits of signature-based detection of buffer overflow attacks
    Kim, S
    Wee, K
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 288 - 293
  • [7] An Adaptive Android Security Extension against Privilege Escalation Attacks
    Xu, Yang
    Ren, Ju
    Zhang, Yaoxue
    Wang, Guojun
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 752 - 760
  • [8] POSTER: The Quest for Security against Privilege Escalation Attacks on Android
    Bugiel, Sven
    Davi, Lucas
    Dmitrienko, Alexandra
    Fischer, Thomas
    Sadeghi, Ahmad-Reza
    Shastry, Bhargava
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 741 - 743
  • [9] Curtailing Privilege Escalation Attacks over Asynchronous Channels on Android
    Mollus, Katharina
    Westhoff, Dirk
    Markmann, Tobias
    2014 14TH INTERNATIONAL CONFERENCE ON INNOVATIONS FOR COMMUNITY SERVICES (I4CS), 2014, : 87 - 94
  • [10] FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware
    Elsabagh, Mohamed
    Johnson, Ryan
    Stavrou, Angelos
    Zuo, Chaoshun
    Zhao, Qingchuan
    Lin, Zhiqiang
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2379 - 2396