An Effective Access Control Scheme for Preventing Permission Leak in Android

被引:0
|
作者
Wu, Longfei [1 ]
Du, Xiaojiang [1 ]
Zhang, Hongli [2 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
关键词
Permission leak; access control; smartphone security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when an application without certain permission illegally gain access to protected resources through other privileged applications. We propose SPAC, a component-level system permission based access control scheme that can help developers better secure the public components of their applications. In the SPAC scheme, obscure custom permissions are replaced by explicit system permissions. We extend current permission checking mechanism so that multiple permissions are supported on component level. SPAC has been implemented on a Nexus 4 smartphone, and our evaluation demonstrates its effectiveness in mitigating permission leak vulnerabilities.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 50 条
  • [41] Extending Mandatory Access Control Policies in Android
    Paraboschi, Stefano
    Bacis, Enrico
    Mutti, Simone
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 21 - 35
  • [42] BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment
    Zhang, Lejun
    Zou, Yanfei
    Yousuf, Muhammad Hassam
    Wang, Weizheng
    Jin, Zilong
    Su, Yansen
    Seokhoon, Kim
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1634 - 1652
  • [43] Efficient Access Control Permission Decision Engine Based on Machine Learning
    Liu, Aodi
    Du, Xuehui
    Wang, Na
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] An Effective Android Software Reinforcement Scheme Based on Online Key
    Xu, Junfeng
    Zhang, Li
    Yang, Luo
    Mao, Ye
    Shi, Xiaolong
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1544 - 1548
  • [45] Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices
    Wu, Longfei
    Brandt, Benjamin
    Du, Xiaojiang
    Ji, Bo
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 55 - 63
  • [46] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [47] Access Control Scheme for Workflow
    Gao Lijun
    Zhang Lu
    Xu Lei
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 215 - 217
  • [48] A permission-combination scalable access control model for Internet of things
    Zhang, Qikun
    Li, Yongjiao
    Zheng, Chuanyang
    Zhu, Liang
    Yuan, Junling
    Hu, Sikang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04):
  • [49] Blockchain based permission delegation and access control in Internet of Things (BACI)
    Ali, Gauhar
    Ahmad, Naveed
    Cao, Yue
    Asif, Muhammad
    Cruickshank, Haitham
    Ali, Qazi Ejaz
    COMPUTERS & SECURITY, 2019, 86 : 318 - 334
  • [50] Android fine-grained permission control system with real-time expert recommendations
    Rashidi, Bahman
    Fung, Carol
    Vu, Tam
    PERVASIVE AND MOBILE COMPUTING, 2016, 32 : 62 - 77