Computer Science ›› 2015, Vol. 42 ›› Issue (11): 191-196.doi: 10.11896/j.issn.1002-137X.2015.11.040

Previous Articles     Next Articles

Mandatory Access Control Model for Android Based on Dynamic Privilege Set

XU Qian and TAN Cheng-xiang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to prevent Android platform from being attacked by the privilege escalation,this paper proposed a mandatory access control model based on the dynamic privilege set.The model analyzes the privilege characteristics of strongly connected component and constructes the privilege partition.Coupling the information flow together with privilege set,the privilege escalation path is abstracted.At last the access control algorithm which has linear complexity was proposed.With the help of tracking the privilege sets dynamically,the fine grained decision strategy was realized.The test result on the prototype system and the comparison with the existing models both show that the model proposed in this paper can fix the privilege escalation attack efficiently.

Key words: Privilege escalation attack,Strongly connected component,Communication network topology,Privilege escalation path,Dynamic privilege set

[1] Davi L,Dmitrienko A,et al.Privilege Escalation Attacks on Android[C]∥Proceedings of the 13th International Conference on Information Security.Berlin:Springer-Verlag,2011:346-360
[2] Enck W,Ongtang M,M cdaniel P.On lightweight mobile phone application certification[C]∥ ACM Conference on Computerand Communications Security.New York:ACM,2009:235-245
[3] Felt A P,Chin E,Hanna S,et al.Android permissions demystified[C]∥ Proceedings of the 18th ACM Conference on Compu-ter and Communications Security.Chicago,USA:ACM Press,2011:627-638
[4] Zhang Y,Yang M,et al.Vetting undesirable behaviors in android apps with permission use analysis[C]∥ Proceedings of 20th ACM Conference on Computer and Communications Secu-rity.New York:ACM,2013:611-622
[5] Yan L K,Yin H,et al.Droidscope:Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis[C]∥ Proceedings of 21th USENIX Security Sympo-sium.California:USENIX Association,2012:569-584
[6] Enck W,Gilbert P,Chun B.TaintDroid:An information-flowtracking system for real-time privacy monitoring on smartphones[C]∥ Proceedings of the 9th USENIX Conference on Ope-rating Systems Design and Implementation.New York:ACM,2010:255-270
[7] Tobias M,Dennis G,et al.QuantDroid:Quantitative Approach towards Mitigating Privilege Escalation on Android[C]∥ IEEE ICC 2013-Communication and Information Systems Security Symposium.German:ICC,2013:2144-2149
[8] Christodorescu M,Jha S,et al.Semantics-aware malware detection[C]∥ Proceedings of the 2005 IEEE Symposium on Security and Privacy.Oakland:IEEE,2005:32-46
[9] Rastogi V,Chen Y,et al.Droidchameleon:evaluating androidanti-malware against transformation attacks[C]∥ Proceedings of the 8th ACM SIGSAC symposium on Information,Computer and Communications Security.New York:ACM,2013:329-334
[10] 彭国军,李晶雯,等.Android恶意软件检测研究与进展[J].武汉大学学报,2015,61(1):21-33 Peng G J,Li J W,et al.Android Malware Detection Research and Development[J].Journal of Wuhan University,2015,61(1):21-33
[11] Felt AP,Wang H J,Moshchuk A,et al.Permission re-delegation:Attacks and defenses[C]∥ Proceedings of the 20th USENIX Security Symposium.Berkeley,CA:USENIX Association,2011:22-37
[12] Bugiel S,Davi L,Dmitrienko A,et al.XManDroid:A new Android evolution to mitigate privilege escalation attacks[R].Darmstadt Technical University:System Security Lab,2011
[13] Bugiel S,Davi L,Dmitrienko A,et al.Towards taming and privilege-escalation attacks on Android[EB/OL].[2012-07-02].http://www.trust.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/pubsPDF/NDSS_2012_Towards_Taming_Privilege-Escalation_Attacks_on_Android.pdf
[14] 蒋绍林,王金双,于晗,等.改进的Android强制访问控制模型[J].计算机应用,2013,33(6):1630-1636 Jiang S L,Wang J S,Yu H,et al.Improved mandatory access control model for Android[J].Journal of Computer Applications,2013,33(6):1630-1636
[15] Nauman M,Khan S.Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform[J].International Journal of Advanced Information Technology,2011,2(8):440-448
[16] Schreckling D,Posegga J,et al.Kynoid:Real-Time Enforcement of Fine-Grained,User-Defined,and Data-Centric Security Policies for Android[C]∥ Proceedings of 6th IFIP WG 11.2 International Workshop.UK:WISTP,2012:208-223
[17] Wang H,Sun L,et al.Building access control policy model for privacy preserving and testing policy conflicting problems[J].Journal of Computer and System Sciences,2013,8(80):1493-1503
[18] Roman S,Zhang K H,et al.Soundcomber:A stealthy and context-aware sound Trojan for smartphones[J/OL].[2011-05-15].http://www.isoc.org/isoc/conferen-ces/ndss/11/pdf/1_1.pdf

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!