Proactive Restart as Cyber Maneuver for Android

被引:0
|
作者
Shan, Zhiyong [1 ]
Neamtiu, Iulian [1 ]
Qian, Zhiyun [1 ]
Torrieri, Don [2 ]
机构
[1] Univ Calif Riverside, Dept Comp Sci & Engn, Riverside, CA 92521 USA
[2] US Army Res Lab, Adelphi, MD 20783 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Moving-target defense is an effective strategy for deflecting cyber attacks. The widespread use of smartphones in the tactical field requires novel ways of securing smartphones against an ever-increasing number of zero-day attacks. We propose a new, proactive approach for securing smartphone apps against certain classes of attacks. We leverage smartphone's native support for quick and lossless restarts to make application restart a cyber maneuver meant to deflect and confuse attackers. We propose a time-series entropy metric to quantify attack resilience. We apply our approach to 12 popular Android apps chosen from a variety of domains, including online banking and shopping. Preliminary experiments with using proactive restarts on these apps show that restart is a promising way of increasing attack resilience for a certain class of side-channel attacks named Activity Inference attacks.
引用
收藏
页码:19 / 24
页数:6
相关论文
共 50 条
  • [1] Cyber Maneuvers and Maneuver Keys
    Torrieri, Don
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 262 - 267
  • [2] Finding Resume and Restart Errors in Android Applications
    Shan, Zhiyong
    Azim, Tanzirul
    Neamtiu, Iulian
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 864 - 880
  • [3] Finding resume and restart errors in Android applications
    Shan Z.
    Azim T.
    Neamtiu I.
    1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (51): : 864 - 880
  • [4] CYBER DEFENSE NETWORK MANEUVER COMMANDER
    Beraud, Paul
    Cruz, Alen
    Hassell, Suzanne
    Sandoval, Juan
    Wiley, Jeffrey J.
    44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 112 - 120
  • [5] Using Cyber Maneuver to Improve Network Resiliency
    Beraud, Paul
    Cruz, Alen
    Hassell, Suzanne
    Meadows, Sonny
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1121 - 1126
  • [6] Cyber Attacks Targeting Android Cellphones
    Varol, Nurhayat
    Aydogan, Ahmet Furkan
    Varol, Asaf
    2017 5TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2017,
  • [7] Proactive Cyber Initiative: An Expert System Framework
    Rohret, David
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 388
  • [8] Analysis of Port Hopping for Proactive Cyber Defense
    Luo, Yue-Bin
    Wang, Bao-Sheng
    Cai, Gui-Lin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 123 - 133
  • [9] A holistic and proactive approach to forecasting cyber threats
    Almahmoud, Zaid
    Yoo, Paul D.
    Alhussein, Omar
    Farhat, Ilyas
    Damiani, Ernesto
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [10] A holistic and proactive approach to forecasting cyber threats
    Zaid Almahmoud
    Paul D. Yoo
    Omar Alhussein
    Ilyas Farhat
    Ernesto Damiani
    Scientific Reports, 13