DPC:A Dynamic Permission Control Mechanism for Android Third-Party Libraries

被引:2
|
作者
Hsu, Fu-Hau [1 ]
Liu, Nien-Chi [1 ]
Hwang, Yan-Ling [2 ]
Liu, Che-Hao [1 ]
Wang, Chuan-Sheng [1 ]
Chen, Chang-Yi [1 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[2] Chung Shan Med Univ, Dept Appl Foreign Languages, Taichung 402, Taiwan
关键词
Libraries; Security; Privacy; Google; Malware; Facebook; Computer science; Third-party library; privacy; in-app advertisement; security;
D O I
10.1109/TDSC.2019.2937925
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today's smartphone app stores are full of apps with diverse features. Many developers use third-party libraries to reduce the development time and cost, but developers often ignore the security problems of third-party libraries. A major security problem introduced by third-party libraries is that a third-party library has the same permissions as the apps, called host-apps hereafter, that use it. According to previous research, having the same permissions as its host apps, a third-party library could have unauthorized access to user data, which poses a serious threat to app users. Therefore, how to prevent third-party libraries from abusing permissions has become an important issue. To solve this problem, this paper proposes a Dynamic Permission Control mechanism, called Dynamic Permission Controller or DPC hereafter, for app developers to prohibit third-party libraries from abusing host apps' dangerous permissions. DPC modifies the permission control mechanism of Android framework to make apps have a more flexible permission management mechanism when they are running. DPC provides new APIs which allows an app to dynamically disable a granted dangerous permission before invoking an API of a third-party library and restore the dangerous permission after completing the API. Hence, DPC protects user's privacy by blocking unauthorized access from third-party libraries. Meanwhile, without the requirement that an app developer needs to know the detail of third-party libraries, the app still can use APIs of third-party libraries safely. Experimental results show that DPC works with many popular apps downloaded from Google Play well and DPC prohibits a third-party library from having the same dangerous permissions that its host apps have. Hence, unlike previous solutions, DPC does not have compatibility problems. The overhead introduced by DPC on an emulator and Nexus 7 are 1.8 and 0.3 percent respectively.
引用
收藏
页码:1751 / 1761
页数:11
相关论文
共 50 条
  • [31] LibKit: Detecting Third-Party Libraries in iOS Apps
    Dominguez-Alvarez, Daniel
    de la Cruz, Alejandro
    Gorla, Alessandra
    Caballero, Juan
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1407 - 1418
  • [32] Understanding Third-party Libraries in Mobile App Analysis
    Wang, Haoyu
    Guo, Yao
    PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, : 515 - 516
  • [33] Selecting Third-Party Libraries: The Web Developers' Perspective
    Tabassum, Mehreen
    Butt, Wasi Haider
    Muzaffar, Abdul Wahab
    Lashari, Saima Anwar
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2024, 34 (12) : 1857 - 1893
  • [34] A First Look at Android Apps' Third-Party Resources Loading
    Qayyum, Hina
    Salman, Muhammad
    Sentana, I. Wayan Budi
    Duc Linh Giang Nguyen
    Ikram, Muhammad
    Tyson, Gareth
    Kaafar, Mohamed Ali
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 193 - 213
  • [35] The vulnerabilities and solutions of third-party login services in android system
    Dong C.
    Yang C.
    Ma J.-F.
    Zhang J.-W.
    1600, Science Press (39): : 582 - 594
  • [36] Fine Grained Confinement of Untrusted Third-Party Applications in Android
    Pande, Prateek
    Mallaiah, Kurra
    Gandhi, Rishi Kumar
    Medatiya, Amit Kumar
    Srinivasachary, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
  • [37] A methodology for the security evaluation within third-party Android Marketplaces
    Buchanan, William J.
    Chiale, Simone
    Macfarlane, Richard
    DIGITAL INVESTIGATION, 2017, 23 : 88 - 98
  • [38] Keyboard or Keylogger?: a security analysis of third-party keyboards on Android
    Cho, Junsung
    Cho, Geumhwan
    Kim, Hyoungshick
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 173 - 176
  • [39] A Systematic Assessment on Android Third-Party Library Detection Tools
    Zhan, Xian
    Liu, Tianming
    Liu, Yepang
    Liu, Yang
    Li, Li
    Wang, Haoyu
    Luo, Xiapu
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4249 - 4273
  • [40] The need for third-party call control
    Chiang, TC
    Gurbani, VK
    Reid, JB
    BELL LABS TECHNICAL JOURNAL, 2002, 7 (01) : 41 - 46