AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems

被引:16
|
作者
Ringer, Talia [1 ]
Grossman, Dan [1 ]
Roesner, Franziska [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
关键词
D O I
10.1145/2976749.2978344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User-driven access control improves the coarse-grained access control of current operating systems (particularly in the mobile space) that provide only all-or-nothing access to a resource such as the camera or the current location. By granting appropriate permissions only in response to explicit user actions (for example, pressing a camera button), user driven access control better aligns application actions with user expectations. Prior work on user-driven access control has relied in essential ways on operating system (OS) modifications to provide applications with uncompromisable access control gadgets, distinguished user interface (UI) elements that can grant access permissions. This work presents a design, implementation, and evaluation of user-driven access control that works with no OS modifications, thus making deployability and incremental adoption of the model more feasible. We develop (1) a user level trusted library for access control gadgets, (2) static analyses to prevent malicious creation of UI events, illegal flows of sensitive information, and circumvention of our library, and (3) dynamic analyses to ensure users are not tricked into granting permissions. In addition to providing the original user-driven access control guarantees, we use static information flow to limit where results derived from sensitive sources may flow in an application. Our implementation targets Android applications. We port open-source applications that need interesting resource permissions to use our system. We determine in what ways user-driven access control in general and our implementation in particular are good matches for real applications. We demonstrate that our system is secure against a variety of attacks that malware on Android could otherwise mount.
引用
收藏
页码:204 / 216
页数:13
相关论文
共 50 条
  • [1] User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
    Roesner, Franziska
    Kohno, Tadayoshi
    Moshchuk, Alexander
    Parno, Bryan
    Wang, Helen J.
    Cowan, Crispin
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 224 - 238
  • [2] UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information
    Ma, Luping
    Zhu, Dali
    Zhang, Shunliang
    Zhang, Xiaohui
    Peng, Shumin
    Li, Ya
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1733 - 1740
  • [3] Investigation of FlexAlgo for User-driven Path Control
    Kulacz, Julia
    Pawlus, Martyna
    Boldrini, Leonardo
    Grosso, Paola
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 516 - 521
  • [4] THE USER-DRIVEN HRIS
    DUNNINGTON, JI
    PERSONNEL, 1989, 66 (07) : 27 - &
  • [5] The User-Driven Collection 4.0: The Next Phase in User-Driven Monographic Acquisition
    Orcutt, Darby
    WHERE DO WE GO FROM HERE?, 2015, : 384 - 385
  • [6] Control Scheme for Sideways Walking on a User-driven Treadmill
    Pyo, Sanghun
    Kim, Hoyoung
    Yoon, Jungwon
    2022 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, ICRA 2022, 2022, : 6963 - 6968
  • [7] MALAREO: a user-driven project
    Gebreslasie, Michael T.
    Bauwens, Ides
    GEOSPATIAL HEALTH, 2015, 10 (02) : 80 - 87
  • [8] USER-DRIVEN APPROACH FOR IT EXPANSION
    NIXON, S
    SEARCH, 1995, 26 (04): : 105 - 105
  • [9] PARATEXT: USER-DRIVEN DEVELOPMENT
    Grassick, Clayton
    Wiens, Hart
    BIBLE TRANSLATOR, 2009, 60 (04): : 234 - 240
  • [10] THE USER-DRIVEN CREATIVE ACADEMY
    Moller, Louise
    Poulsen, Soren Bolvig
    DESIGN EDUCATION: COLLABORATION AND CROSS-DISCIPLINARY, 2016, : 576 - 581