Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2898375.2898389acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

Raindroid: a system for run-time mitigation of Android intent vulnerabilities [poster]

Published: 19 April 2016 Publication History
  • Get Citation Alerts
  • Abstract

    Modern frameworks are required to be extendable as well as secure. However, these two qualities are often at odds. In this poster we describe an approach that uses a combination of static analysis and run-time management, based on software architecture models, that can improve security while maintaining framework extendability. We implement a prototype of the approach for the Android platform. Static analysis identifies the architecture and communication patterns among the collection of apps on an Android device and which communications might be vulnerable to attack. Run-time mechanisms monitor these potentially vulnerable communication patterns, and adapt the system to either deny them, request explicit approval from the user, or allow them.

    References

    [1]
    M. Abi-Antoun, S. Chandrashekar, R. Vanciu, and A. Giang. Are object graphs extracted using abstract interpretation significantly different from the code? In SCAM 2014, 2014.
    [2]
    S.-W. Cheng. Rainbow: Cost-Effective Software Architecture-Based Self-Adaptation. PhD thesis, Carnegie Mellon University, May 2008. Institute for Software Research Technical Report CMU-ISR-08-113.
    [3]
    E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In MobiSys '11, 2011.
    [4]
    D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste. Rainbow: Architecture-based self adaptation with reusable infrastructure. IEEE Computer, 37(10), October 2004.
    [5]
    D. Garlan and B. Schmerl. Architecture-driven modelling and analysis. In Proceedings of the 11th Australian Workshop on Safety Related Programmable Systems (SCS'06), 2006.
    [6]
    D. Jackson. Software Abstractions: Logic, Language, and Analysis. The MIT Press, 2006.
    [7]
    G. A. Lewis and P. Lago. A catalog of architectural tactics for cyber-foraging. In Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, QoSA '15, pages 53--62, New York, NY, USA, 2015. ACM.
    [8]
    S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2014.
    [9]
    A. Sadeghi, H. Bagheri, and S. Malek. Analysis of android inter-app security vulnerabilities using COVERT. In ICSE 2015, 2015.
    [10]
    B. Schmerl, J. Gennari, and D. Garlan. An architecture style for android security analysis: Poster. In Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS '15, pages 15:1--15:2, New York, NY, USA, 2015. ACM.
    [11]
    R. Vanciu and M. Abi-Antoun. Ownership object graphs with dataflow edges. In 20th Working Conference on Reverse Engineering (WCRE), 2013.

    Cited By

    View all
    • (2022)Formal model for inter-component communication and its security in androidComputing10.1007/s00607-022-01069-2104:8(1839-1865)Online publication date: 27-Mar-2022
    • (2021)Looking Back! Using Early Versions of Android Apps as Attack VectorsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.291420218:2(652-666)Online publication date: 1-Mar-2021
    • (2019)Edge Computing Security: State of the Art and ChallengesProceedings of the IEEE10.1109/JPROC.2019.2918437107:8(1608-1631)Online publication date: Aug-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HotSos '16: Proceedings of the Symposium and Bootcamp on the Science of Security
    April 2016
    138 pages
    ISBN:9781450342773
    DOI:10.1145/2898375
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 April 2016

    Check for updates

    Author Tags

    1. security
    2. self-adaptation
    3. software architecture

    Qualifiers

    • Poster

    Funding Sources

    Conference

    HotSoS '16
    HotSoS '16: HotSos 2016 Science of Security
    April 19 - 21, 2016
    Pennsylvania, Pittsburgh

    Acceptance Rates

    Overall Acceptance Rate 34 of 60 submissions, 57%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Formal model for inter-component communication and its security in androidComputing10.1007/s00607-022-01069-2104:8(1839-1865)Online publication date: 27-Mar-2022
    • (2021)Looking Back! Using Early Versions of Android Apps as Attack VectorsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.291420218:2(652-666)Online publication date: 1-Mar-2021
    • (2019)Edge Computing Security: State of the Art and ChallengesProceedings of the IEEE10.1109/JPROC.2019.2918437107:8(1608-1631)Online publication date: Aug-2019
    • (2017)ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)10.1109/ICST.2017.61(532-539)Online publication date: Mar-2017

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media