Proactive Restart as Cyber Maneuver for Android

被引:0
|
作者
Shan, Zhiyong [1 ]
Neamtiu, Iulian [1 ]
Qian, Zhiyun [1 ]
Torrieri, Don [2 ]
机构
[1] Univ Calif Riverside, Dept Comp Sci & Engn, Riverside, CA 92521 USA
[2] US Army Res Lab, Adelphi, MD 20783 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Moving-target defense is an effective strategy for deflecting cyber attacks. The widespread use of smartphones in the tactical field requires novel ways of securing smartphones against an ever-increasing number of zero-day attacks. We propose a new, proactive approach for securing smartphone apps against certain classes of attacks. We leverage smartphone's native support for quick and lossless restarts to make application restart a cyber maneuver meant to deflect and confuse attackers. We propose a time-series entropy metric to quantify attack resilience. We apply our approach to 12 popular Android apps chosen from a variety of domains, including online banking and shopping. Preliminary experiments with using proactive restarts on these apps show that restart is a promising way of increasing attack resilience for a certain class of side-channel attacks named Activity Inference attacks.
引用
收藏
页码:19 / 24
页数:6
相关论文
共 50 条
  • [21] Defensive Maneuver Cyber Platform Modeling with Stochastic Petri Nets
    Moody, William Clay
    Hu, Hongxin
    Apon, Amy
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 531 - 538
  • [22] Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework
    McKneely, Jennifer A. B.
    Sell, Tara K.
    Straub, Kathleen A.
    Ayenson, Mika D.
    Thomas, Daniel
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2022, 2022, 13333 : 358 - 379
  • [23] Leveraging machine learning for proactive detection and mitigation of Android RAT
    Ghosh, Subhasish
    Ponduru, Jithin
    Thatikonda, Mukesh
    Mandal, Amit Kr
    Innovations in Systems and Software Engineering, 2024,
  • [24] Leveraging machine learning for proactive detection and mitigation of Android RAT
    Ghosh, Subhasish
    Ponduru, Jithin
    Thatikonda, Mukesh
    Mandal, Amit Kr
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024,
  • [25] Collaboration as proactive measure against cyber warfare in South Africa
    Grobler, Marthie
    van Vuuren, Joey Jansen
    AFRICAN SECURITY REVIEW, 2012, 21 (02) : 61 - 73
  • [26] Proactive Cyber Security Response by Utilizing Passive Monitoring Technologies
    Nakao, Koji
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [27] Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud
    Alavizadeh, Hootan
    Alavizadeh, Hooman
    Jang-Jaccard, Julian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1277 - 1285
  • [28] Combining Prediction Methods with Cyber Information for Proactive Route Recommendation
    Yanagihara, Tadashi
    Namiki, Ryosuke
    Nawa, Kazunari
    Weir, David
    Oguchi, Kentaro
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 87 - +
  • [29] Defning proactive software assurance practices for healthier cyber ecosystems
    Badillo, Brian
    Abrams, Marc
    CrossTalk, 2012, 25 (05): : 20 - 24
  • [30] Proactive Cyber Situation Awareness via High Performance Computing
    Wollaber, Allan
    Pena, Jaime
    Blease, Benjamin
    Shing, Leslie
    Alperin, Kenneth
    Vilvovsky, Serge
    Trepagnier, Pierre
    Wagner, Neal
    Leonard, Leslie
    2019 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2019,