Determination and Enforcement of Least-Privilege Architecture in Android

被引:17
|
作者
Hammad, Mahmoud [1 ]
Bagheri, Hamid [2 ]
Malek, Sam [1 ]
机构
[1] Univ Calif Irvine, Dept Informat, Irvine, CA 92697 USA
[2] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICSA.2017.18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern mobile platforms rely on a permission model to guard the system's resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components belonging to an app inherit those permissions, an app's components are typically over-privileged, i.e., components are granted more privileges than they need to complete their tasks. Systematic violation of least-privilege principle in Android has shown to be the root cause of many security vulnerabilities. To mitigate this issue, we have developed DELDROID, an automated system for determination of least privilege architecture in Android and its enforcement at runtime. A key contribution of our approach is the ability to limit the privileges granted to apps without the need to modify them. DELDROID utilizes static program analysis techniques to extract the exact privileges each component needs for providing its functionality. A Multiple-Domain Matrix representation of the system's architecture is then used to automatically analyze the security posture of the system and derive its least-privilege architecture. Our experiments on hundreds of real-world apps corroborate DELDROID's ability in effectively establishing the least-privilege architecture and its benefits in alleviating the security threats.
引用
收藏
页码:59 / 68
页数:10
相关论文
共 50 条
  • [1] DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android
    Hammad, Mahmoud
    Bagheri, Hamid
    Malek, Sam
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 149 : 83 - 100
  • [2] Least-Privilege Calls to Amazon Web Services
    Gill, Puneet
    Dietl, Werner
    Tripunitara, Mahesh
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2085 - 2096
  • [3] Dynamic, context-aware, least-privilege Grid delegation
    Ahsant, Mehran
    Basney, Jim
    Johnsson, Lennart
    [J]. 2007 8TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2007, : 90 - +
  • [4] NodeSentry: Least-privilege library integration for server-side JavaScript
    De Groef, Willem
    Massacci, Fabio
    Piessens, Frank
    [J]. ACM International Conference Proceeding Series, 2014, 2014-December (December): : 446 - 455
  • [5] WebJail: Least-privilege Integration of Third-party Components in Web Mashups
    Van Acker, Steven
    De Ryck, Philippe
    Desmet, Lieven
    Piessens, Frank
    Joosen, Wouter
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 307 - 316
  • [6] Automated Enforcement of the Principle of Least Privilege over Data Source Access
    Wu, Haoqi
    Yu, Zhengxuan
    Huang, Dapeng
    Zhang, Haodong
    Han, Weili
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 510 - 517
  • [7] Improving least privilege in software architecture by guided automated compartmentalization
    Buyens, Koen
    De Win, Bart
    Joosen, Wouter
    [J]. WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 145 - 150
  • [8] Quantitative analysis and enforcement of the principle of least privilege in role-based access control
    Lai, Chunren
    Zhang, Chang N.
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
  • [9] Distributed Privilege Enforcement in PACS
    Sturm, Christoph
    Hunt, Ela
    Scholl, Marc H.
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 142 - +
  • [10] Least privilege and more
    Schneider, FB
    [J]. COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 253 - 258