Determination and Enforcement of Least-Privilege Architecture in Android

被引:17
|
作者
Hammad, Mahmoud [1 ]
Bagheri, Hamid [2 ]
Malek, Sam [1 ]
机构
[1] Univ Calif Irvine, Dept Informat, Irvine, CA 92697 USA
[2] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICSA.2017.18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern mobile platforms rely on a permission model to guard the system's resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components belonging to an app inherit those permissions, an app's components are typically over-privileged, i.e., components are granted more privileges than they need to complete their tasks. Systematic violation of least-privilege principle in Android has shown to be the root cause of many security vulnerabilities. To mitigate this issue, we have developed DELDROID, an automated system for determination of least privilege architecture in Android and its enforcement at runtime. A key contribution of our approach is the ability to limit the privileges granted to apps without the need to modify them. DELDROID utilizes static program analysis techniques to extract the exact privileges each component needs for providing its functionality. A Multiple-Domain Matrix representation of the system's architecture is then used to automatically analyze the security posture of the system and derive its least-privilege architecture. Our experiments on hundreds of real-world apps corroborate DELDROID's ability in effectively establishing the least-privilege architecture and its benefits in alleviating the security threats.
引用
收藏
页码:59 / 68
页数:10
相关论文
共 50 条
  • [21] Least privilege analysis in software architectures
    Koen Buyens
    Riccardo Scandariato
    Wouter Joosen
    [J]. Software & Systems Modeling, 2013, 12 : 331 - 348
  • [22] Game to Dethrone: A Least Privilege CTF
    Wu, Wenjing
    Feng, Wu-chang
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 132 - 137
  • [23] A taxonomy of privilege escalation attacks in Android applications
    Rangwala, Mohammed
    Zhang, Ping
    Zou, Xukai
    Li, Feng
    [J]. International Journal of Security and Networks, 2014, 9 (01) : 40 - 55
  • [24] Least privilege analysis in software architectures
    Buyens, Koen
    Scandariato, Riccardo
    Joosen, Wouter
    [J]. SOFTWARE AND SYSTEMS MODELING, 2013, 12 (02): : 331 - 348
  • [25] A New Secure Android Model Based on Privilege
    Zhang, Tao
    Wang, Zhilong
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 179 - 184
  • [26] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    [J]. MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [27] SplitSecond: Flexible Privilege Separation of Android Apps
    Lee, Jehyun
    Raja, Akshaya Venkateswara
    Gao, Debin
    [J]. 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings, 2019,
  • [28] Least Privilege Learning for Attribute Obfuscation
    Brown, Glen
    Martinez-del-Rincon, Jesus
    Miller, Paul
    [J]. PATTERN RECOGNITION, ACPR 2021, PT II, 2022, 13189 : 142 - 156
  • [29] Monitoring of Root Privilege Escalation in Android Kernel
    Hu, Xueli
    Xi, Qi
    Wang, Zhenxing
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 491 - 503
  • [30] Analysis of Access Control Enforcement in Android
    Enck, William
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 117 - 118